Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0033 (GCVE-0-2009-0033)
Vulnerability from cvelistv5 – Published: 2009-06-05 15:25 – Updated: 2024-08-07 04:17- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:17:10.437Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-4.html"
},
{
"name": "HPSBMA02535",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "35326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35326"
},
{
"name": "MDVSA-2009:138",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"name": "FEDORA-2009-11356",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
},
{
"name": "DSA-2207",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "35344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35344"
},
{
"name": "HPSBUX02860",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "ADV-2010-3056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "35788",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35788"
},
{
"name": "SSRT100029",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "APPLE-SA-2010-03-29-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name": "JVN#87272440",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"name": "ADV-2009-1496",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"name": "HPSBOV02762",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "1022331",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1022331"
},
{
"name": "ADV-2009-1856",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"name": "oval:org.mitre.oval:def:10231",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"name": "35193",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35193"
},
{
"name": "MDVSA-2010:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "42368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42368"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4077"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"name": "FEDORA-2009-11374",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"name": "35685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "SSRT100825",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "FEDORA-2009-11352",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "oval:org.mitre.oval:def:19110",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"name": "SUSE-SR:2009:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "HPSBUX02579",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "SSRT101146",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "MDVSA-2009:136",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"name": "263529",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"name": "SSRT100203",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-ajp-dos(50928)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "oval:org.mitre.oval:def:5739",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-06-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:08:52.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-4.html"
},
{
"name": "HPSBMA02535",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "35326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35326"
},
{
"name": "MDVSA-2009:138",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"name": "FEDORA-2009-11356",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
},
{
"name": "DSA-2207",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "35344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35344"
},
{
"name": "HPSBUX02860",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "ADV-2010-3056",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "35788",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35788"
},
{
"name": "SSRT100029",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "APPLE-SA-2010-03-29-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name": "JVN#87272440",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"name": "ADV-2009-1496",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"name": "HPSBOV02762",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "1022331",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1022331"
},
{
"name": "ADV-2009-1856",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"name": "oval:org.mitre.oval:def:10231",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"name": "35193",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35193"
},
{
"name": "MDVSA-2010:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "42368",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42368"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4077"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"name": "FEDORA-2009-11374",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"name": "35685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "SSRT100825",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "FEDORA-2009-11352",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "oval:org.mitre.oval:def:19110",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"name": "SUSE-SR:2009:012",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "HPSBUX02579",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "SSRT101146",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "MDVSA-2009:136",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"name": "263529",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"name": "SSRT100203",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "tomcat-ajp-dos(50928)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "oval:org.mitre.oval:def:5739",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-0033",
"datePublished": "2009-06-05T15:25:00.000Z",
"dateReserved": "2008-12-15T00:00:00.000Z",
"dateUpdated": "2024-08-07T04:17:10.437Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2009-0033",
"date": "2026-05-12",
"epss": "0.13832",
"percentile": "0.94353"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E300013-0CE7-4313-A553-74A6A247B3E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08D7414-8D0C-45D6-8E87-679DF0201D55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60CFD9CA-1878-4C74-A9BD-5D581736E6B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7E52BE7-5281-4430-8846-E41CF34FC214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02860646-1D72-4D9A-AE2A-5868C8EDB3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BE4B9B5-9C2E-47E1-9483-88A17264594F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BE92A9B-4B8C-468E-9162-A56ED5313E17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE21D455-5B38-4B07-8E25-4EE782501EB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9AE125C-EB8E-4D33-BB64-1E2AEE18BF81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47588ABB-FCE6-478D-BEAD-FC9A0C7D66DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBDA8066-294D-431E-B026-C03707DFBCD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C92F3744-C8F9-4E29-BF1A-25E03A32F2C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"084B3227-FE22-43E3-AE06-7BB257018690\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2BFF1D5-2E34-4A01-83A7-6AA3A112A1B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D536FF4-7582-4351-ABE3-876E20F8E7FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB43F47F-5BF9-43A0-BF0E-451B4A8F7137\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFFFE700-AAFE-4F5B-B0E2-C3DA76DE492D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11DDD82E-5D83-4581-B2F3-F12655BBF817\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0F0C91-171E-421D-BE86-11567DEFC7BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F22D2621-D305-43CE-B00D-9A7563B061F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A5D55E8-D3A3-4784-8AC6-CCB07E470AB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F4245BA-B05C-49DE-B2E0-1E588209ED3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8633532B-9785-4259-8840-B08529E20DCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D9BD7E-FCC2-404B-A057-1A10997DAFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F935ED72-58F4-49C1-BD9F-5473E0B9D8CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FADB75DC-8713-4F0C-9F06-30DA6F6EF6B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EA52901-2D16-4F7E-BF5E-780B42A55D6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A79DA2C-35F3-47DE-909B-8D8D1AE111C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF6952D-6308-4029-8B63-0BD9C648C60F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94941F86-0BBF-4F30-8F13-FB895A11ED69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17522878-4266-432A-859D-C02096C8AC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"951FFCD7-EAC2-41E6-A53B-F90C540327E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF1F2738-C7D6-4206-9227-43F464887FF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98EEB6F2-A721-45CF-A856-0E01B043C317\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02FDE602-A56A-477E-B704-41AF92EEBB9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A28B11A-3BC7-41BC-8970-EE075B029F5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AD3E84C-9A2E-4586-A09E-CBDEB1E7F695\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EF54C08-5FF1-4D02-AA16-B13096BD566C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8F3B31D-8974-4016-ACAF-E7A917C99F84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34672E90-C220-436B-9143-480941227933\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D56581E2-9ECD-426A-96D8-A9D958900AD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717F6995-5AF0-484C-90C0-A82F25FD2E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B0C01D5-773F-469C-9E69-170C2844AAA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5CF79C-759B-4FF9-90EE-847264059E93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"357651FD-392E-4775-BF20-37A23B3ABAE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585B9476-6B86-4809-9B9E-26112114CB59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9276A093-9C98-4617-9941-2276995F5848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5878E08E-2741-4798-94E9-BA8E07386B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69F6BAB7-C099-4345-A632-7287AEA555B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3AAF031-D16B-4D51-9581-2D1376A5157B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51120689-F5C0-4DF1-91AA-314C40A46C58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D70CFD9-B55D-4A29-B94C-D33F3E881A8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E3C039-A949-4F1B-892A-57147EECB249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F28C7801-41B9-4552-BA1E-577967BCBBEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25B21085-7259-4685-9D1F-FF98E6489E10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"635EE321-2A1F-4FF8-95BE-0C26591969D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11951A10-39A2-4FF5-8C43-DF94730FB794\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B6B0504-27C1-4824-A928-A878CBBAB32D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D903956B-14F5-4177-AF12-0A5F1846D3C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.\"}, {\"lang\": \"es\", \"value\": \"Apache Tomcat v4.1.0 hasta v4.1.39, v5.5.0 hasta v5.5.27 y v6.0.0 hasta v6.0.18, cuando se utilizan el conector Java AJP y el balanceo de carga mod_jk; permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de una solicitud manipulada con cabeceras inv\\u00e1lidas. Est\\u00e1 relacionado con el bloqueo temporal de los conectores que han encontrado errores, tal como se ha demostrado por un error que implica una cabecera HTTP Host mal formada.\"}]",
"id": "CVE-2009-0033",
"lastModified": "2024-11-21T00:58:54.777",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-06-05T16:00:00.187",
"references": "[{\"url\": \"http://jvn.jp/en/jp/JVN87272440/index.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/35326\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35344\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35685\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/35788\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/37460\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/42368\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1022331\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT4077\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://svn.apache.org/viewvc?rev=742915\u0026view=rev\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://svn.apache.org/viewvc?rev=781362\u0026view=rev\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-4.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-5.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-6.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2207\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:136\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:138\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/504044/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/35193\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1496\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1856\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3056\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/50928\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://jvn.jp/en/jp/JVN87272440/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35326\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35344\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35685\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35788\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37460\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/42368\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1022331\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT4077\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.apache.org/viewvc?rev=742915\u0026view=rev\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://svn.apache.org/viewvc?rev=781362\u0026view=rev\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-4.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-5.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://tomcat.apache.org/security-6.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2207\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:136\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:138\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/504044/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1496\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1856\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3056\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/50928\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0033\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-06-05T16:00:00.187\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.\"},{\"lang\":\"es\",\"value\":\"Apache Tomcat v4.1.0 hasta v4.1.39, v5.5.0 hasta v5.5.27 y v6.0.0 hasta v6.0.18, cuando se utilizan el conector Java AJP y el balanceo de carga mod_jk; permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una solicitud manipulada con cabeceras inv\u00e1lidas. Est\u00e1 relacionado con el bloqueo temporal de los conectores que han encontrado errores, tal como se ha demostrado por un error que implica una cabecera HTTP Host mal formada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E300013-0CE7-4313-A553-74A6A247B3E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D7414-8D0C-45D6-8E87-679DF0201D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CFD9CA-1878-4C74-A9BD-5D581736E6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7E52BE7-5281-4430-8846-E41CF34FC214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02860646-1D72-4D9A-AE2A-5868C8EDB3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE4B9B5-9C2E-47E1-9483-88A17264594F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE92A9B-4B8C-468E-9162-A56ED5313E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE21D455-5B38-4B07-8E25-4EE782501EB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9AE125C-EB8E-4D33-BB64-1E2AEE18BF81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47588ABB-FCE6-478D-BEAD-FC9A0C7D66DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDA8066-294D-431E-B026-C03707DFBCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C92F3744-C8F9-4E29-BF1A-25E03A32F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084B3227-FE22-43E3-AE06-7BB257018690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BFF1D5-2E34-4A01-83A7-6AA3A112A1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D536FF4-7582-4351-ABE3-876E20F8E7FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB43F47F-5BF9-43A0-BF0E-451B4A8F7137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFFE700-AAFE-4F5B-B0E2-C3DA76DE492D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DDD82E-5D83-4581-B2F3-F12655BBF817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0F0C91-171E-421D-BE86-11567DEFC7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22D2621-D305-43CE-B00D-9A7563B061F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5D55E8-D3A3-4784-8AC6-CCB07E470AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4245BA-B05C-49DE-B2E0-1E588209ED3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8633532B-9785-4259-8840-B08529E20DCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9BD7E-FCC2-404B-A057-1A10997DAFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F935ED72-58F4-49C1-BD9F-5473E0B9D8CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADB75DC-8713-4F0C-9F06-30DA6F6EF6B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA52901-2D16-4F7E-BF5E-780B42A55D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A79DA2C-35F3-47DE-909B-8D8D1AE111C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF6952D-6308-4029-8B63-0BD9C648C60F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94941F86-0BBF-4F30-8F13-FB895A11ED69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17522878-4266-432A-859D-C02096C8AC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951FFCD7-EAC2-41E6-A53B-F90C540327E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1F2738-C7D6-4206-9227-43F464887FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98EEB6F2-A721-45CF-A856-0E01B043C317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FDE602-A56A-477E-B704-41AF92EEBB9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A28B11A-3BC7-41BC-8970-EE075B029F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AD3E84C-9A2E-4586-A09E-CBDEB1E7F695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EF54C08-5FF1-4D02-AA16-B13096BD566C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F3B31D-8974-4016-ACAF-E7A917C99F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34672E90-C220-436B-9143-480941227933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56581E2-9ECD-426A-96D8-A9D958900AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6995-5AF0-484C-90C0-A82F25FD2E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D70CFD9-B55D-4A29-B94C-D33F3E881A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN87272440/index.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35326\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35344\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35685\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35788\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42368\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1022331\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?rev=742915\u0026view=rev\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?rev=781362\u0026view=rev\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-4.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:136\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:138\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/504044/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/35193\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1496\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1856\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3056\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50928\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://jvn.jp/en/jp/JVN87272440/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35326\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35788\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1022331\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?rev=742915\u0026view=rev\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?rev=781362\u0026view=rev\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-4.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/504044/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1496\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/3056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50928\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2012-AVI-219
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont étés corrigées dans HP OpenVMS. Ces vulnérabilités affectent plusieurs éléments du produit. Elles permettent de contourner des politiques de sécurité, de s'élever des privilèges, d'effectuer des modifications non autorisées, de causer des dénis de service et d'accéder à des informations non permises.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et antérieures ; | ||
| Centreon | N/A | HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64. | ||
| Centreon | N/A | HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et antérieures ; |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et ant\u00e9rieures ;",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64.",
"product": {
"name": "N/A",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Centreon",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2010-3870",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
},
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2010-4697",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4697"
},
{
"name": "CVE-2010-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
},
{
"name": "CVE-2011-2729",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
},
{
"name": "CVE-2010-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
},
{
"name": "CVE-2010-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2100"
},
{
"name": "CVE-2010-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2484"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2010-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2531"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2012-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0134"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2011-0752",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0752"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2010-1864",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1864"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2010-2191",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2191"
},
{
"name": "CVE-2010-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2101"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2006-7243",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2010-4698",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4698"
},
{
"name": "CVE-2010-2225",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2225"
},
{
"name": "CVE-2010-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2097"
},
{
"name": "CVE-2011-1464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2010-1860",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1860"
},
{
"name": "CVE-2010-2190",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2190"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2010-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2010-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1862"
}
],
"links": [],
"reference": "CERTA-2012-AVI-219",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9s corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP OpenVMS\u003c/span\u003e. Ces vuln\u00e9rabilit\u00e9s affectent plusieurs\n\u00e9l\u00e9ments du produit. Elles permettent de contourner des politiques de\ns\u00e9curit\u00e9, de s\u0027\u00e9lever des privil\u00e8ges, d\u0027effectuer des modifications non\nautoris\u00e9es, de causer des d\u00e9nis de service et d\u0027acc\u00e9der \u00e0 des\ninformations non permises.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP OpenVMS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281867 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281867"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281831 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281831"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281869 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281869"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTA-2010-AVI-143
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mac OS X.
Description
Plusieurs vulnérabilités ont été corrigées dans Mac OS X. Elles permettent entre autres l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Elles\npermettent entre autres l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0511",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0511"
},
{
"name": "CVE-2010-0509",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0509"
},
{
"name": "CVE-2010-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0501"
},
{
"name": "CVE-2010-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0065"
},
{
"name": "CVE-2010-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0498"
},
{
"name": "CVE-2010-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0060"
},
{
"name": "CVE-2008-7247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-7247"
},
{
"name": "CVE-2003-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0063"
},
{
"name": "CVE-2010-0043",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0043"
},
{
"name": "CVE-2010-0522",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0522"
},
{
"name": "CVE-2010-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0063"
},
{
"name": "CVE-2009-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3559"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2009-4142",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4142"
},
{
"name": "CVE-2009-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3009"
},
{
"name": "CVE-2010-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0059"
},
{
"name": "CVE-2010-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0524"
},
{
"name": "CVE-2010-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0057"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2010-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0521"
},
{
"name": "CVE-2008-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0564"
},
{
"name": "CVE-2010-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0518"
},
{
"name": "CVE-2010-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0513"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2009-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3558"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2010-0517",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0517"
},
{
"name": "CVE-2010-0535",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0535"
},
{
"name": "CVE-2010-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0393"
},
{
"name": "CVE-2009-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3557"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2010-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0042"
},
{
"name": "CVE-2010-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0534"
},
{
"name": "CVE-2010-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0497"
},
{
"name": "CVE-2008-4456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4456"
},
{
"name": "CVE-2009-4143",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4143"
},
{
"name": "CVE-2010-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0058"
},
{
"name": "CVE-2010-0041",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0041"
},
{
"name": "CVE-2010-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0508"
},
{
"name": "CVE-2010-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0506"
},
{
"name": "CVE-2010-0533",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0533"
},
{
"name": "CVE-2010-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0507"
},
{
"name": "CVE-2010-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0504"
},
{
"name": "CVE-2009-0316",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0316"
},
{
"name": "CVE-2010-0526",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0526"
},
{
"name": "CVE-2010-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0510"
},
{
"name": "CVE-2009-1904",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1904"
},
{
"name": "CVE-2010-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0500"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2009-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2042"
},
{
"name": "CVE-2010-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0064"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2446"
},
{
"name": "CVE-2009-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2801"
},
{
"name": "CVE-2010-0525",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0525"
},
{
"name": "CVE-2010-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0516"
},
{
"name": "CVE-2010-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0502"
},
{
"name": "CVE-2010-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0062"
},
{
"name": "CVE-2008-2712",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2712"
},
{
"name": "CVE-2009-2906",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2906"
},
{
"name": "CVE-2010-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0505"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4214"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2009-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0689"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2006-1329",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1329"
},
{
"name": "CVE-2010-0514",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0514"
},
{
"name": "CVE-2009-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0037"
},
{
"name": "CVE-2010-0515",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0515"
},
{
"name": "CVE-2009-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2422"
},
{
"name": "CVE-2010-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0056"
},
{
"name": "CVE-2010-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0512"
},
{
"name": "CVE-2009-2632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2632"
},
{
"name": "CVE-2009-0688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0688"
},
{
"name": "CVE-2008-4101",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4101"
},
{
"name": "CVE-2010-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0537"
},
{
"name": "CVE-2010-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0519"
},
{
"name": "CVE-2010-0523",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0523"
},
{
"name": "CVE-2010-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0520"
},
{
"name": "CVE-2010-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0503"
},
{
"name": "CVE-2010-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0055"
}
],
"links": [],
"reference": "CERTA-2010-AVI-143",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4077 du 29 mars 2010",
"url": "http://support.apple.com/kb/HT4077"
}
]
}
CERTA-2012-AVI-219
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont étés corrigées dans HP OpenVMS. Ces vulnérabilités affectent plusieurs éléments du produit. Elles permettent de contourner des politiques de sécurité, de s'élever des privilèges, d'effectuer des modifications non autorisées, de causer des dénis de service et d'accéder à des informations non permises.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et antérieures ; | ||
| Centreon | N/A | HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64. | ||
| Centreon | N/A | HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et antérieures ; |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et ant\u00e9rieures ;",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64.",
"product": {
"name": "N/A",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Centreon",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2010-3870",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
},
{
"name": "CVE-2010-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
},
{
"name": "CVE-2010-4697",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4697"
},
{
"name": "CVE-2010-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
},
{
"name": "CVE-2011-2729",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-3190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
},
{
"name": "CVE-2010-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
},
{
"name": "CVE-2010-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2100"
},
{
"name": "CVE-2010-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2484"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2010-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2531"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2012-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0134"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2011-0752",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0752"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2010-1864",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1864"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2010-2191",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2191"
},
{
"name": "CVE-2010-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2101"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2006-7243",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2010-4698",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4698"
},
{
"name": "CVE-2010-2225",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2225"
},
{
"name": "CVE-2010-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2097"
},
{
"name": "CVE-2011-1464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2010-1860",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1860"
},
{
"name": "CVE-2010-2190",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2190"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2010-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2010-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1862"
}
],
"links": [],
"reference": "CERTA-2012-AVI-219",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9s corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP OpenVMS\u003c/span\u003e. Ces vuln\u00e9rabilit\u00e9s affectent plusieurs\n\u00e9l\u00e9ments du produit. Elles permettent de contourner des politiques de\ns\u00e9curit\u00e9, de s\u0027\u00e9lever des privil\u00e8ges, d\u0027effectuer des modifications non\nautoris\u00e9es, de causer des d\u00e9nis de service et d\u0027acc\u00e9der \u00e0 des\ninformations non permises.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP OpenVMS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281867 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281867"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281831 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281831"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03281869 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281869"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTA-2010-AVI-220
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans HP Performance Manager permettent à un utilisateur distant malintentionné de provoquer un déni de service, de contourner la politique de sécurité, de porter atteinte à la confidentialité et à l'intégrité des données, d'élever ses privilèges ou encore de réaliser une attaque par injection de code indirecte.
Description
De nombreuses vulnérabilités ont été corrigées dans HP Performance Manager. Elles peuvent être exploitées par une personne malveillante afin de :
- de provoquer un déni de service (CVE-2009-0033) ;
- de contourner la politique de sécurité (CVE-2008-5515, CVE-2009-2901) ;
- de porter atteinte à l'intégrité des données (CVE-2009-0783, CVE-2009-2693, CVE-2009-2902) ;
- de porter atteinte à la confidentialité des données (CVE-2009-0580, CVE-2009-0783) ;
- d'élever ses privilèges (CVE-2009-3548) ;
- de réaliser une attaque par injection de code indirecte (CVE-2009-0781) ;
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Performance Manager v8.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Performance Manager v8.20 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Performance Manager v8.21 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans HP Performance\nManager. Elles peuvent \u00eatre exploit\u00e9es par une personne malveillante\nafin de :\n\n- de provoquer un d\u00e9ni de service (CVE-2009-0033) ;\n- de contourner la politique de s\u00e9curit\u00e9 (CVE-2008-5515,\n CVE-2009-2901) ;\n- de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es (CVE-2009-0783,\n CVE-2009-2693, CVE-2009-2902) ;\n- de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es (CVE-2009-0580,\n CVE-2009-0783) ;\n- d\u0027\u00e9lever ses privil\u00e8ges (CVE-2009-3548) ;\n- de r\u00e9aliser une attaque par injection de code indirecte\n (CVE-2009-0781) ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02181353"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02181353"
}
],
"reference": "CERTA-2010-AVI-220",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-05-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans HP Performance Manager\npermettent \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni\nde service, de contourner la politique de s\u00e9curit\u00e9, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, d\u0027\u00e9lever ses privil\u00e8ges\nou encore de r\u00e9aliser une attaque par injection de code indirecte.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP Performance Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de scurit HP #c02181353 du 17 mai 2010",
"url": null
}
]
}
CERTA-2010-AVI-220
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans HP Performance Manager permettent à un utilisateur distant malintentionné de provoquer un déni de service, de contourner la politique de sécurité, de porter atteinte à la confidentialité et à l'intégrité des données, d'élever ses privilèges ou encore de réaliser une attaque par injection de code indirecte.
Description
De nombreuses vulnérabilités ont été corrigées dans HP Performance Manager. Elles peuvent être exploitées par une personne malveillante afin de :
- de provoquer un déni de service (CVE-2009-0033) ;
- de contourner la politique de sécurité (CVE-2008-5515, CVE-2009-2901) ;
- de porter atteinte à l'intégrité des données (CVE-2009-0783, CVE-2009-2693, CVE-2009-2902) ;
- de porter atteinte à la confidentialité des données (CVE-2009-0580, CVE-2009-0783) ;
- d'élever ses privilèges (CVE-2009-3548) ;
- de réaliser une attaque par injection de code indirecte (CVE-2009-0781) ;
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP Performance Manager v8.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Performance Manager v8.20 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP Performance Manager v8.21 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans HP Performance\nManager. Elles peuvent \u00eatre exploit\u00e9es par une personne malveillante\nafin de :\n\n- de provoquer un d\u00e9ni de service (CVE-2009-0033) ;\n- de contourner la politique de s\u00e9curit\u00e9 (CVE-2008-5515,\n CVE-2009-2901) ;\n- de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es (CVE-2009-0783,\n CVE-2009-2693, CVE-2009-2902) ;\n- de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es (CVE-2009-0580,\n CVE-2009-0783) ;\n- d\u0027\u00e9lever ses privil\u00e8ges (CVE-2009-3548) ;\n- de r\u00e9aliser une attaque par injection de code indirecte\n (CVE-2009-0781) ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-3548",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02181353"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02181353"
}
],
"reference": "CERTA-2010-AVI-220",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-05-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans HP Performance Manager\npermettent \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni\nde service, de contourner la politique de s\u00e9curit\u00e9, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, d\u0027\u00e9lever ses privil\u00e8ges\nou encore de r\u00e9aliser une attaque par injection de code indirecte.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP Performance Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de scurit HP #c02181353 du 17 mai 2010",
"url": null
}
]
}
CERTA-2010-AVI-143
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mac OS X.
Description
Plusieurs vulnérabilités ont été corrigées dans Mac OS X. Elles permettent entre autres l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Elles\npermettent entre autres l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0511",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0511"
},
{
"name": "CVE-2010-0509",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0509"
},
{
"name": "CVE-2010-0501",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0501"
},
{
"name": "CVE-2010-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0065"
},
{
"name": "CVE-2010-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0498"
},
{
"name": "CVE-2010-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0060"
},
{
"name": "CVE-2008-7247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-7247"
},
{
"name": "CVE-2003-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0063"
},
{
"name": "CVE-2010-0043",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0043"
},
{
"name": "CVE-2010-0522",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0522"
},
{
"name": "CVE-2010-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0063"
},
{
"name": "CVE-2009-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3559"
},
{
"name": "CVE-2009-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
},
{
"name": "CVE-2009-4142",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4142"
},
{
"name": "CVE-2009-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3009"
},
{
"name": "CVE-2010-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0059"
},
{
"name": "CVE-2010-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0524"
},
{
"name": "CVE-2010-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0057"
},
{
"name": "CVE-2009-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
},
{
"name": "CVE-2010-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0521"
},
{
"name": "CVE-2008-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0564"
},
{
"name": "CVE-2010-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0518"
},
{
"name": "CVE-2010-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0513"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2009-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3558"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2009-2902",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
},
{
"name": "CVE-2010-0517",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0517"
},
{
"name": "CVE-2010-0535",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0535"
},
{
"name": "CVE-2010-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0393"
},
{
"name": "CVE-2009-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3557"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2010-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0042"
},
{
"name": "CVE-2010-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0534"
},
{
"name": "CVE-2010-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0497"
},
{
"name": "CVE-2008-4456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4456"
},
{
"name": "CVE-2009-4143",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4143"
},
{
"name": "CVE-2010-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0058"
},
{
"name": "CVE-2010-0041",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0041"
},
{
"name": "CVE-2010-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0508"
},
{
"name": "CVE-2010-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0506"
},
{
"name": "CVE-2010-0533",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0533"
},
{
"name": "CVE-2010-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0507"
},
{
"name": "CVE-2010-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0504"
},
{
"name": "CVE-2009-0316",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0316"
},
{
"name": "CVE-2010-0526",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0526"
},
{
"name": "CVE-2010-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0510"
},
{
"name": "CVE-2009-1904",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1904"
},
{
"name": "CVE-2010-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0500"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2009-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2042"
},
{
"name": "CVE-2010-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0064"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2446"
},
{
"name": "CVE-2009-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2801"
},
{
"name": "CVE-2010-0525",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0525"
},
{
"name": "CVE-2010-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0516"
},
{
"name": "CVE-2010-0502",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0502"
},
{
"name": "CVE-2010-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0062"
},
{
"name": "CVE-2008-2712",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2712"
},
{
"name": "CVE-2009-2906",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2906"
},
{
"name": "CVE-2010-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0505"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4214"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2009-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0689"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2006-1329",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1329"
},
{
"name": "CVE-2010-0514",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0514"
},
{
"name": "CVE-2009-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0037"
},
{
"name": "CVE-2010-0515",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0515"
},
{
"name": "CVE-2009-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2422"
},
{
"name": "CVE-2010-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0056"
},
{
"name": "CVE-2010-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0512"
},
{
"name": "CVE-2009-2632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2632"
},
{
"name": "CVE-2009-0688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0688"
},
{
"name": "CVE-2008-4101",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4101"
},
{
"name": "CVE-2010-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0537"
},
{
"name": "CVE-2010-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0519"
},
{
"name": "CVE-2010-0523",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0523"
},
{
"name": "CVE-2010-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0520"
},
{
"name": "CVE-2010-0503",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0503"
},
{
"name": "CVE-2010-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0055"
}
],
"links": [],
"reference": "CERTA-2010-AVI-143",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4077 du 29 mars 2010",
"url": "http://support.apple.com/kb/HT4077"
}
]
}
CERTA-2009-AVI-211
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans Apache Tomcat permettent à un utilisateur distant de provoquer un déni de service et de porter atteinte à la confidentialité et à l'intégrité des données.
Description
Plusieurs vulnérabilités sont présentes dans Apache Tomcat :
- la première est relative à une erreur dans le traitement de certains en-têtes HTTP par le composant AJP Connector. Elle permet à un utilisateur distant de provoquer un déni de service ;
- la deuxième concerne certaines fonctionnalités d'authentification et permet à un personne distante d'obtenir des identifiants valides d'utilisateur via des requêtes particulières ;
- la troisième est relative à la gestion des fichiers web.xml et tld qui peuvent être modifiés par une application particulière dans une autre application si celles-ci sont dans la même instance de Tomcat ;
- la quatrième est due à une vulnérabilité dans le RequestDispatcher et permet à un utilisateur malintentionné d'accéder à des données sensibles ;
- la dernière est due à une erreur dans le calendrier permettant de réaliser une attaque par injection de code indirecte.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apache Tomcat versions 4.1.39 et ant\u00e9rieures ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Apache Tomcat versions 6.0.18 et ant\u00e9rieures.",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Apache Tomcat versions 5.5.27 et ant\u00e9rieures ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Apache Tomcat :\n\n- la premi\u00e8re est relative \u00e0 une erreur dans le traitement de certains\n en-t\u00eates HTTP par le composant AJP Connector. Elle permet \u00e0 un\n utilisateur distant de provoquer un d\u00e9ni de service ;\n- la deuxi\u00e8me concerne certaines fonctionnalit\u00e9s d\u0027authentification et\n permet \u00e0 un personne distante d\u0027obtenir des identifiants valides\n d\u0027utilisateur via des requ\u00eates particuli\u00e8res ;\n- la troisi\u00e8me est relative \u00e0 la gestion des fichiers web.xml et tld\n qui peuvent \u00eatre modifi\u00e9s par une application particuli\u00e8re dans une\n autre application si celles-ci sont dans la m\u00eame instance de Tomcat\n ;\n- la quatri\u00e8me est due \u00e0 une vuln\u00e9rabilit\u00e9 dans le RequestDispatcher\n et permet \u00e0 un utilisateur malintentionn\u00e9 d\u0027acc\u00e9der \u00e0 des donn\u00e9es\n sensibles ;\n- la derni\u00e8re est due \u00e0 une erreur dans le calendrier permettant de\n r\u00e9aliser une attaque par injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX du 21 octobre 2009 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01908935"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124404378413736\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124404378913734\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124412001618125\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-4.html"
}
],
"reference": "CERTA-2009-AVI-211",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2009-06-08T00:00:00.000000"
},
{
"description": "ajout de r\u00e9f\u00e9rence CVE et du bulletin HP-UX.",
"revision_date": "2009-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Apache Tomcat permettent \u00e0 un\nutilisateur distant de provoquer un d\u00e9ni de service et de porter\natteinte \u00e0 la confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de Apache Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apache Tomcat du 03 juin 2009",
"url": null
}
]
}
CERTA-2009-AVI-211
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans Apache Tomcat permettent à un utilisateur distant de provoquer un déni de service et de porter atteinte à la confidentialité et à l'intégrité des données.
Description
Plusieurs vulnérabilités sont présentes dans Apache Tomcat :
- la première est relative à une erreur dans le traitement de certains en-têtes HTTP par le composant AJP Connector. Elle permet à un utilisateur distant de provoquer un déni de service ;
- la deuxième concerne certaines fonctionnalités d'authentification et permet à un personne distante d'obtenir des identifiants valides d'utilisateur via des requêtes particulières ;
- la troisième est relative à la gestion des fichiers web.xml et tld qui peuvent être modifiés par une application particulière dans une autre application si celles-ci sont dans la même instance de Tomcat ;
- la quatrième est due à une vulnérabilité dans le RequestDispatcher et permet à un utilisateur malintentionné d'accéder à des données sensibles ;
- la dernière est due à une erreur dans le calendrier permettant de réaliser une attaque par injection de code indirecte.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apache Tomcat versions 4.1.39 et ant\u00e9rieures ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Apache Tomcat versions 6.0.18 et ant\u00e9rieures.",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Apache Tomcat versions 5.5.27 et ant\u00e9rieures ;",
"product": {
"name": "Tomcat",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Apache Tomcat :\n\n- la premi\u00e8re est relative \u00e0 une erreur dans le traitement de certains\n en-t\u00eates HTTP par le composant AJP Connector. Elle permet \u00e0 un\n utilisateur distant de provoquer un d\u00e9ni de service ;\n- la deuxi\u00e8me concerne certaines fonctionnalit\u00e9s d\u0027authentification et\n permet \u00e0 un personne distante d\u0027obtenir des identifiants valides\n d\u0027utilisateur via des requ\u00eates particuli\u00e8res ;\n- la troisi\u00e8me est relative \u00e0 la gestion des fichiers web.xml et tld\n qui peuvent \u00eatre modifi\u00e9s par une application particuli\u00e8re dans une\n autre application si celles-ci sont dans la m\u00eame instance de Tomcat\n ;\n- la quatri\u00e8me est due \u00e0 une vuln\u00e9rabilit\u00e9 dans le RequestDispatcher\n et permet \u00e0 un utilisateur malintentionn\u00e9 d\u0027acc\u00e9der \u00e0 des donn\u00e9es\n sensibles ;\n- la derni\u00e8re est due \u00e0 une erreur dans le calendrier permettant de\n r\u00e9aliser une attaque par injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX du 21 octobre 2009 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01908935"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124404378413736\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124404378913734\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat du 03 juin 2009 :",
"url": "http://marc.info/?l=tomcat-user\u0026m=124412001618125\u0026w=2"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Tomcat :",
"url": "http://tomcat.apache.org/security-4.html"
}
],
"reference": "CERTA-2009-AVI-211",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2009-06-08T00:00:00.000000"
},
{
"description": "ajout de r\u00e9f\u00e9rence CVE et du bulletin HP-UX.",
"revision_date": "2009-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Apache Tomcat permettent \u00e0 un\nutilisateur distant de provoquer un d\u00e9ni de service et de porter\natteinte \u00e0 la confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de Apache Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apache Tomcat du 03 juin 2009",
"url": null
}
]
}
RHSA-2009:1617
Vulnerability from csaf_redhat - Published: 2009-11-30 15:18 - Updated: 2025-11-21 17:35Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated tomcat package that fixes several security issues is now\navailable for Red Hat Network Satellite Server 5.1.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThis update corrects several security vulnerabilities in the Tomcat\ncomponent shipped as part of Red Hat Network Satellite Server. In a typical\noperating environment, Tomcat is not exposed to users of Satellite Server\nin a vulnerable manner: By default, only Satellite Server applications are\nrunning on Tomcat. This update will reduce risk in unique Satellite Server\nenvironments.\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\nthis updated tomcat package, which contains backported patches to resolve\nthese issues. Tomcat must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1617",
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1617.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server",
"tracking": {
"current_release_date": "2025-11-21T17:35:32+00:00",
"generator": {
"date": "2025-11-21T17:35:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1617",
"initial_release_date": "2009-11-30T15:18:00+00:00",
"revision_history": [
{
"date": "2009-11-30T15:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-30T10:18:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product_id": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.0.30-0jpp_16rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product_id": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.0.30-0jpp_16rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch"
},
"product_reference": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.src as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
},
"product_reference": "tomcat5-0:5.0.30-0jpp_16rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1164
Vulnerability from csaf_redhat - Published: 2009-07-21 20:50 - Updated: 2024-12-15 18:14Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:0871 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: with this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nA cross-site scripting (XSS) flaw was found in the examples calendar\napplication. With some web browsers, remote attackers could use this flaw\nto inject arbitrary web script or HTML via the \"time\" parameter.\n(CVE-2009-0781)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1164",
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1164.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:07+00:00",
"generator": {
"date": "2024-12-15T18:14:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1164",
"initial_release_date": "2009-07-21T20:50:00+00:00",
"revision_history": [
{
"date": "2009-07-21T20:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-21T16:56:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0781",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489028"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: XSS in Apache Tomcat calendar application",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0781\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0781"
},
{
"category": "external",
"summary": "RHBZ#489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781"
}
],
"release_date": "2009-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: XSS in Apache Tomcat calendar application"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009:1616
Vulnerability from csaf_redhat - Published: 2009-11-30 15:16 - Updated: 2025-11-21 17:35Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Network Satellite Server 5.2 and 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThis update corrects several security vulnerabilities in the Tomcat\ncomponent shipped as part of Red Hat Network Satellite Server. In a typical\noperating environment, Tomcat is not exposed to users of Satellite Server\nin a vulnerable manner: By default, only Satellite Server applications are\nrunning on Tomcat. This update will reduce risk in unique Satellite Server\nenvironments.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:1069 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Red Hat Network Satellite Server 5.2 and 5.3 are advised to\nupgrade to these updated tomcat packages, which contain backported patches\nto resolve these issues. Tomcat must be restarted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1616",
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1616.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server",
"tracking": {
"current_release_date": "2025-11-21T17:35:31+00:00",
"generator": {
"date": "2025-11-21T17:35:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1616",
"initial_release_date": "2009-11-30T15:16:00+00:00",
"revision_history": [
{
"date": "2009-11-30T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-30T10:16:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.2::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009:1562
Vulnerability from csaf_redhat - Published: 2009-11-09 15:26 - Updated: 2025-11-21 17:35Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:0876 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nA cross-site scripting (XSS) flaw was found in the examples calendar\napplication. With some web browsers, remote attackers could use this flaw\nto inject arbitrary web script or HTML via the \"time\" parameter.\n(CVE-2009-0781)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1562",
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1562.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:26+00:00",
"generator": {
"date": "2025-11-21T17:35:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1562",
"initial_release_date": "2009-11-09T15:26:00+00:00",
"revision_history": [
{
"date": "2009-11-09T15:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-09T10:26:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0781",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489028"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: XSS in Apache Tomcat calendar application",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0781\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0781"
},
{
"category": "external",
"summary": "RHBZ#489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781"
}
],
"release_date": "2009-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: XSS in Apache Tomcat calendar application"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009:1454
Vulnerability from csaf_redhat - Published: 2009-09-21 15:51 - Updated: 2025-11-21 17:35Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix several security issues are now available\nfor JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 23 September 2009]\nThis erratum has been updated to include replacement packages for JBoss\nEnterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4. The original\npackages did not contain a fix for the low security impact issue\nCVE-2009-0783. The packages for JBoss Enterprise Web Server 1.0.0 for Red\nHat Enterprise Linux 5 are unchanged as they included the fix for\nCVE-2009-0783.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that Tomcat does not properly handle a certain character\nand character sequence in cookie values. A remote attacker could use this\nflaw to obtain sensitive information, such as session IDs, and then use\nthis information for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1454",
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1454.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:12+00:00",
"generator": {
"date": "2025-11-21T17:35:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1454",
"initial_release_date": "2009-09-21T15:51:00+00:00",
"revision_history": [
{
"date": "2009-09-21T15:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-23T11:15:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product_id": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.6.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product_id": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-1.patch07.19.ep5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009:1164
Vulnerability from csaf_redhat - Published: 2009-07-21 20:50 - Updated: 2025-11-21 17:34Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:0871 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: with this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nA cross-site scripting (XSS) flaw was found in the examples calendar\napplication. With some web browsers, remote attackers could use this flaw\nto inject arbitrary web script or HTML via the \"time\" parameter.\n(CVE-2009-0781)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1164",
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1164.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:54+00:00",
"generator": {
"date": "2025-11-21T17:34:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1164",
"initial_release_date": "2009-07-21T20:50:00+00:00",
"revision_history": [
{
"date": "2009-07-21T20:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-21T16:56:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.7.el5_3.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0781",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489028"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: XSS in Apache Tomcat calendar application",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0781\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0781"
},
{
"category": "external",
"summary": "RHBZ#489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781"
}
],
"release_date": "2009-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: XSS in Apache Tomcat calendar application"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-21T20:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1164"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Client:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.src",
"5Server:tomcat5-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.7.el5_3.2.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.7.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1616
Vulnerability from csaf_redhat - Published: 2009-11-30 15:16 - Updated: 2024-12-15 18:14Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Network Satellite Server 5.2 and 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThis update corrects several security vulnerabilities in the Tomcat\ncomponent shipped as part of Red Hat Network Satellite Server. In a typical\noperating environment, Tomcat is not exposed to users of Satellite Server\nin a vulnerable manner: By default, only Satellite Server applications are\nrunning on Tomcat. This update will reduce risk in unique Satellite Server\nenvironments.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:1069 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Red Hat Network Satellite Server 5.2 and 5.3 are advised to\nupgrade to these updated tomcat packages, which contain backported patches\nto resolve these issues. Tomcat must be restarted for this update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1616",
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1616.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server",
"tracking": {
"current_release_date": "2024-12-15T18:14:28+00:00",
"generator": {
"date": "2024-12-15T18:14:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1616",
"initial_release_date": "2009-11-30T15:16:00+00:00",
"revision_history": [
{
"date": "2009-11-30T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-30T10:16:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.2::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:16:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1616"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.2:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-RHNSAT5.3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-RHNSAT5.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1454
Vulnerability from csaf_redhat - Published: 2009-09-21 15:51 - Updated: 2024-12-15 18:14Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat5 packages that fix several security issues are now available\nfor JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 23 September 2009]\nThis erratum has been updated to include replacement packages for JBoss\nEnterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4. The original\npackages did not contain a fix for the low security impact issue\nCVE-2009-0783. The packages for JBoss Enterprise Web Server 1.0.0 for Red\nHat Enterprise Linux 5 are unchanged as they included the fix for\nCVE-2009-0783.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that Tomcat does not properly handle a certain character\nand character sequence in cookie values. A remote attacker could use this\nflaw to obtain sensitive information, such as session IDs, and then use\nthis information for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1454",
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1454.json"
}
],
"title": "Red Hat Security Advisory: tomcat5 security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:11+00:00",
"generator": {
"date": "2024-12-15T18:14:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1454",
"initial_release_date": "2009-09-21T15:51:00+00:00",
"revision_history": [
{
"date": "2009-09-21T15:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-23T11:15:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-1.patch07.19.ep5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product_id": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.6.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product_id": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-1.patch07.19.ep5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src"
},
"product_reference": "tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-21T15:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1454"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-0:5.5.23-1.patch07.19.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-1.patch07.19.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-0:5.5.23-0jpp.9.6.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.6.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.23-0jpp.9.6.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009:1563
Vulnerability from csaf_redhat - Published: 2009-11-09 15:37 - Updated: 2025-11-21 17:35Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2008:0195 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1563",
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1563.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:26+00:00",
"generator": {
"date": "2025-11-21T17:35:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1563",
"initial_release_date": "2009-11-09T15:37:00+00:00",
"revision_history": [
{
"date": "2009-11-09T15:37:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-09T10:37:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1506
Vulnerability from csaf_redhat - Published: 2009-10-14 16:15 - Updated: 2024-12-15 18:14Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat6 packages that fix several security issues are now available\nfor JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1506",
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-6.html",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1506.json"
}
],
"title": "Red Hat Security Advisory: tomcat6 security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:16+00:00",
"generator": {
"date": "2024-12-15T18:14:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1506",
"initial_release_date": "2009-10-14T16:15:00+00:00",
"revision_history": [
{
"date": "2009-10-14T16:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-10-14T12:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product_id": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-12.0.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product_id": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-11.3.ep5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src"
},
"product_reference": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1563
Vulnerability from csaf_redhat - Published: 2009-11-09 15:37 - Updated: 2024-12-15 18:14Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Developer Suite 3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2008:0195 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1563",
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1563.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:24+00:00",
"generator": {
"date": "2024-12-15T18:14:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1563",
"initial_release_date": "2009-11-09T15:37:00+00:00",
"revision_history": [
{
"date": "2009-11-09T15:37:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-09T10:37:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product": {
"name": "Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_developer_suite:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Suite v.3"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_18rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_18rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_id": "tomcat5-0:5.5.23-0jpp_18rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_18rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_18rh.src as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_18rh.src",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch as a component of Red Hat Developer Suite v.3 (AS v.4)",
"product_id": "4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch",
"relates_to_product_reference": "4AS-DS3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:37:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1563"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-0:5.5.23-0jpp_18rh.src",
"4AS-DS3:tomcat5-common-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jasper-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-server-lib-0:5.5.23-0jpp_18rh.noarch",
"4AS-DS3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_18rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2010_0602
Vulnerability from csaf_redhat - Published: 2010-08-04 21:30 - Updated: 2024-12-15 18:14Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
CWE-125 - Out-of-bounds Read| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that fix multiple security issues and rebase various\ncomponents are now available for Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is an enterprise software system designed\nto manage enterprise Public Key Infrastructure (PKI) deployments.\n\nMultiple buffer overflow flaws were discovered in the way the pcscd daemon,\na resource manager that coordinates communications with smart card readers\nand smart cards connected to the system, handled client requests. A local\nuser could create a specially-crafted request that would cause the pcscd\ndaemon to crash or, possibly, execute arbitrary code. (CVE-2010-0407,\nCVE-2009-4901)\n\nThis erratum updates the Tomcat component shipped as part of Red Hat\nCertificate System to version 5.5.23, to address multiple security issues.\nIn a typical operating environment, Tomcat is not exposed to users of\nCertificate System in a vulnerable manner. These security updates will\nreduce risk in unique Certificate System environments. (CVE-2005-2090,\nCVE-2005-3510, CVE-2006-3835, CVE-2007-0450, CVE-2007-1358, CVE-2007-3382,\nCVE-2007-3385, CVE-2007-5461, CVE-2007-5333, CVE-2008-0128, CVE-2008-1232,\nCVE-2008-2370, CVE-2008-5515, CVE-2009-0033, CVE-2009-0580)\n\nThis erratum provides updated versions of the following components,\nrequired by the updated Tomcat version: ant, avalon-logkit, axis,\nclasspathx-jaf, classpathx-mail, geronimo-specs, jakarta-commons-modeler,\nlog4j, mx4j, xerces-j2, and xml-commons.\n\nA number of components have been updated to fix security issues for users\nof Red Hat Certificate System for the Solaris operating system. These fixes\nare for apr issue CVE-2009-2412; apr-util issues CVE-2009-0023,\nCVE-2009-1955, CVE-2009-1956, and CVE-2009-2412; httpd issues\nCVE-2006-3918, CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847,\nCVE-2007-4465, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2008-2364,\nCVE-2008-2939, CVE-2009-1891, CVE-2009-3094, CVE-2009-3095, and\nCVE-2010-0434; mod_perl issue CVE-2007-1349; and perl issues CVE-2007-5116\nand CVE-2008-1927.\n\nNote: Updated apr, apr-util, httpd, mod_perl, and perl packages were\npreviously available to users of Red Hat Certificate System for Red Hat\nEnterprise Linux via the Red Hat Enterprise Linux 4 channels on the Red Hat\nNetwork.\n\nAdditionally, the rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks,\nrhpki-java-tools, and rhpki-native-tools packages were updated to address\nsome anomalous behavior on the Solaris operating system. (BZ#600513,\nBZ#605760)\n\nAs well, this update provides an updated rhpki-manage package, which\nincludes installation and uninstall scripts for Red Hat Certificate System\nthat have been updated with the list of packages required by the Tomcat\ncomponent, and an updated dependency on the NSS and NSPR packages.\n\nAll users of Red Hat Certificate System are advised to upgrade to these\nupdated packages, which correct these issues. Refer to the Red Hat\nCertificate System Administration Guide, linked to in the References, for\ndetails on how to install the updated packages on the Solaris operating\nsystem. After installing this update, all Red Hat Certificate System\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthe update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0602",
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html",
"url": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html"
},
{
"category": "external",
"summary": "200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0602.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Certificate System 7.3 security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:44+00:00",
"generator": {
"date": "2024-12-15T18:14:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2010:0602",
"initial_release_date": "2010-08-04T21:30:00+00:00",
"revision_history": [
{
"date": "2010-08-04T21:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-05T10:04:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4AS",
"product": {
"name": "Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4ES",
"product": {
"name": "Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_id": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_id": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_id": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_id": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-manage@7.3.0-19.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_id": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ca@7.3.0-20.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_id": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-kra@7.3.0-14.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-tks@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ocsp@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_id": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-java-tools@7.3.0-10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jms-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jta-1.0.1B-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-deployment-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-ejb-2.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-servlet-2.4-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs-javadoc@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-1.4-apis@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-connector-1.5-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jsp-2.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-management-1.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product_id": "ant-0:1.6.5-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product_id": "axis-0:1.2.1-1jpp_3rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product_id": "log4j-0:1.2.12-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product_id": "pcsc-lite-0:1.3.3-3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-2090",
"discovery_date": "2005-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237079"
}
],
"notes": [
{
"category": "description",
"text": "Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat multiple content-length header poisioning",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2090"
},
{
"category": "external",
"summary": "RHBZ#237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090"
}
],
"release_date": "2005-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat multiple content-length header poisioning"
},
{
"cve": "CVE-2005-3510",
"discovery_date": "2005-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237085"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat DoS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3510"
},
{
"category": "external",
"summary": "RHBZ#237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510"
}
],
"release_date": "2005-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat DoS"
},
{
"cve": "CVE-2006-3835",
"discovery_date": "2006-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237084"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory listing issue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.\n\nDetails on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3835"
},
{
"category": "external",
"summary": "RHBZ#237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3835",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835"
}
],
"release_date": "2006-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat directory listing issue"
},
{
"cve": "CVE-2006-3918",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2006-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200732"
}
],
"notes": [
{
"category": "description",
"text": "http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Expect header XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3918"
},
{
"category": "external",
"summary": "RHBZ#200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3918",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918"
}
],
"release_date": "2006-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Expect header XSS"
},
{
"cve": "CVE-2006-5752",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245112"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_status XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5752"
},
{
"category": "external",
"summary": "RHBZ#245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752"
}
],
"release_date": "2007-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_status XSS"
},
{
"cve": "CVE-2007-0450",
"discovery_date": "2007-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237080"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) \"/\" (slash), (2) \"\\\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory traversal",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0450"
},
{
"category": "external",
"summary": "RHBZ#237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450"
}
],
"release_date": "2007-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat directory traversal"
},
{
"cve": "CVE-2007-1349",
"discovery_date": "2007-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "240423"
}
],
"notes": [
{
"category": "description",
"text": "PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_perl PerlRun denial of service",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1349"
},
{
"category": "external",
"summary": "RHBZ#240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1349"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349"
}
],
"release_date": "2007-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mod_perl PerlRun denial of service"
},
{
"cve": "CVE-2007-1358",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244803"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted \"Accept-Language headers that do not conform to RFC 2616\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat accept-language xss flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1358"
},
{
"category": "external",
"summary": "RHBZ#244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358"
}
],
"release_date": "2007-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat accept-language xss flaw"
},
{
"cve": "CVE-2007-1863",
"discovery_date": "2007-05-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244658"
}
],
"notes": [
{
"category": "description",
"text": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_cache segfault",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1863"
},
{
"category": "external",
"summary": "RHBZ#244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1863",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863"
}
],
"release_date": "2007-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_cache segfault"
},
{
"cve": "CVE-2007-3304",
"discovery_date": "2007-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245111"
}
],
"notes": [
{
"category": "description",
"text": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd scoreboard lack of PID protection",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3304"
},
{
"category": "external",
"summary": "RHBZ#245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3304",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304"
}
],
"release_date": "2007-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd scoreboard lack of PID protection"
},
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-3847",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2007-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250731"
}
],
"notes": [
{
"category": "description",
"text": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: out of bounds read",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3847"
},
{
"category": "external",
"summary": "RHBZ#250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: out of bounds read"
},
{
"cve": "CVE-2007-4465",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-09-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "289511"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_autoindex XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is actually a flaw in browsers that do not derive the response character set as required by RFC 2616. This does not affect the default configuration of Apache httpd in Red Hat products and will only affect customers who have removed the \"AddDefaultCharset\" directive and are using directory indexes. The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4465"
},
{
"category": "external",
"summary": "RHBZ#289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465"
}
],
"release_date": "2007-09-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_autoindex XSS"
},
{
"cve": "CVE-2007-5000",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "419931"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_imagemap XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5000"
},
{
"category": "external",
"summary": "RHBZ#419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000"
}
],
"release_date": "2007-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_imagemap XSS"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy",
"Will Drewry"
]
}
],
"cve": "CVE-2007-5116",
"discovery_date": "2007-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "323571"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl regular expression UTF parsing errors",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5116"
},
{
"category": "external",
"summary": "RHBZ#323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116"
}
],
"release_date": "2007-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl regular expression UTF parsing errors"
},
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2007-6388",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427228"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache mod_status cross-site scripting",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6388"
},
{
"category": "external",
"summary": "RHBZ#427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388"
}
],
"release_date": "2007-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache mod_status cross-site scripting"
},
{
"cve": "CVE-2008-0005",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427739"
}
],
"notes": [
{
"category": "description",
"text": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_proxy_ftp XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0005"
},
{
"category": "external",
"summary": "RHBZ#427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005"
}
],
"release_date": "2008-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_proxy_ftp XSS"
},
{
"cve": "CVE-2008-0128",
"discovery_date": "2008-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "429821"
}
],
"notes": [
{
"category": "description",
"text": "The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat5 SSO cookie login information disclosure",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0128"
},
{
"category": "external",
"summary": "RHBZ#429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128"
}
],
"release_date": "2006-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat5 SSO cookie login information disclosure"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1927",
"discovery_date": "2008-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443928"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: heap corruption by regular expressions with utf8 characters",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1927"
},
{
"category": "external",
"summary": "RHBZ#443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927"
}
],
"release_date": "2007-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl: heap corruption by regular expressions with utf8 characters"
},
{
"cve": "CVE-2008-2364",
"discovery_date": "2008-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451615"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2364"
},
{
"category": "external",
"summary": "RHBZ#451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364"
}
],
"release_date": "2008-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2939",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458250"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp globbing XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2939"
},
{
"category": "external",
"summary": "RHBZ#458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939"
}
],
"release_date": "2008-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp globbing XSS"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0023",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503928"
}
],
"notes": [
{
"category": "description",
"text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util heap buffer underwrite",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0023"
},
{
"category": "external",
"summary": "RHBZ#503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util heap buffer underwrite"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-1955",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504555"
}
],
"notes": [
{
"category": "description",
"text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util billion laughs attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1955"
},
{
"category": "external",
"summary": "RHBZ#504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955"
}
],
"release_date": "2009-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util billion laughs attack"
},
{
"cve": "CVE-2009-1956",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504390"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util single NULL byte buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1956"
},
{
"category": "external",
"summary": "RHBZ#504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956"
}
],
"release_date": "2009-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util single NULL byte buffer overflow"
},
{
"cve": "CVE-2009-2412",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515698"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2412"
},
{
"category": "external",
"summary": "RHBZ#515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412"
}
],
"release_date": "2009-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management"
},
{
"cve": "CVE-2009-3094",
"discovery_date": "2009-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521619"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3094"
},
{
"category": "external",
"summary": "RHBZ#521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094"
}
],
"release_date": "2009-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply"
},
{
"cve": "CVE-2009-3095",
"discovery_date": "2009-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "522209"
}
],
"notes": [
{
"category": "description",
"text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3095"
},
{
"category": "external",
"summary": "RHBZ#522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095"
}
],
"release_date": "2009-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header"
},
{
"cve": "CVE-2009-4901",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4901"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0407",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0407"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0434",
"discovery_date": "2010-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "570171"
}
],
"notes": [
{
"category": "description",
"text": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: request header information leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0434"
},
{
"category": "external",
"summary": "RHBZ#570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: request header information leak"
}
]
}
RHSA-2009:1506
Vulnerability from csaf_redhat - Published: 2009-10-14 16:15 - Updated: 2025-11-21 17:35Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat6 packages that fix several security issues are now available\nfor JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1506",
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-6.html",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1506.json"
}
],
"title": "Red Hat Security Advisory: tomcat6 security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:20+00:00",
"generator": {
"date": "2025-11-21T17:35:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1506",
"initial_release_date": "2009-10-14T16:15:00+00:00",
"revision_history": [
{
"date": "2009-10-14T16:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-10-14T12:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.18-12.0.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.18-11.3.ep5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product_id": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-12.0.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product_id": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.18-11.3.ep5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-11.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src"
},
"product_reference": "tomcat6-0:6.0.18-11.3.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.18-12.0.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src"
},
"product_reference": "tomcat6-0:6.0.18-12.0.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-10-14T16:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1506"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-0:6.0.18-11.3.ep5.el4.src",
"4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-11.3.ep5.el4.noarch",
"4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-11.3.ep5.el4.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-0:6.0.18-12.0.ep5.el5.src",
"5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.18-12.0.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.18-12.0.ep5.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1562
Vulnerability from csaf_redhat - Published: 2009-11-09 15:26 - Updated: 2024-12-15 18:14Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Application Server v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was discovered that the Red Hat Security Advisory RHSA-2007:0876 did not\naddress all possible flaws in the way Tomcat handles certain characters and\ncharacter sequences in cookie values. A remote attacker could use this flaw\nto obtain sensitive information, such as session IDs, and then use this\ninformation for session hijacking attacks. (CVE-2007-5333)\n\nNote: The fix for the CVE-2007-5333 flaw changes the default cookie\nprocessing behavior: With this update, version 0 cookies that contain\nvalues that must be quoted to be valid are automatically changed to version\n1 cookies. To reactivate the previous, but insecure behavior, add the\nfollowing entry to the \"/etc/tomcat5/catalina.properties\" file:\n\norg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that the error checking methods of certain authentication\nclasses did not have sufficient error checking, allowing remote attackers\nto enumerate (via brute force methods) usernames registered with\napplications running on Tomcat when FORM-based authentication was used.\n(CVE-2009-0580)\n\nA cross-site scripting (XSS) flaw was found in the examples calendar\napplication. With some web browsers, remote attackers could use this flaw\nto inject arbitrary web script or HTML via the \"time\" parameter.\n(CVE-2009-0781)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1562",
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1562.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2024-12-15T18:14:20+00:00",
"generator": {
"date": "2024-12-15T18:14:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1562",
"initial_release_date": "2009-11-09T15:26:00+00:00",
"revision_history": [
{
"date": "2009-11-09T15:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-09T10:26:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:14:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Server v2 4AS",
"product": {
"name": "Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4ES",
"product": {
"name": "Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Server v2 4WS",
"product": {
"name": "Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_server:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4AS",
"product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4ES",
"product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Application Server v2 4WS",
"product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4WS-RHAPS2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-0781",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489028"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: XSS in Apache Tomcat calendar application",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0781\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0781"
},
{
"category": "external",
"summary": "RHBZ#489028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0781"
}
],
"release_date": "2009-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: XSS in Apache Tomcat calendar application"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-09T15:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1562"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.16.noarch",
"4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.16.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2009_1617
Vulnerability from csaf_redhat - Published: 2009-11-30 15:18 - Updated: 2024-11-22 03:25Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated tomcat package that fixes several security issues is now\navailable for Red Hat Network Satellite Server 5.1.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nThis update corrects several security vulnerabilities in the Tomcat\ncomponent shipped as part of Red Hat Network Satellite Server. In a typical\noperating environment, Tomcat is not exposed to users of Satellite Server\nin a vulnerable manner: By default, only Satellite Server applications are\nrunning on Tomcat. This update will reduce risk in unique Satellite Server\nenvironments.\n\nIt was discovered that request dispatchers did not properly normalize user\nrequests that have trailing query strings, allowing remote attackers to\nsend specially-crafted requests that would cause an information leak.\n(CVE-2008-5515)\n\nA flaw was found in the way the Tomcat AJP (Apache JServ Protocol)\nconnector processes AJP connections. An attacker could use this flaw to\nsend specially-crafted requests that would cause a temporary denial of\nservice. (CVE-2009-0033)\n\nIt was discovered that web applications containing their own XML parsers\ncould replace the XML parser Tomcat uses to parse configuration files. A\nmalicious web application running on a Tomcat instance could read or,\npotentially, modify the configuration and XML-based data of other web\napplications deployed on the same Tomcat instance. (CVE-2009-0783)\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\nthis updated tomcat package, which contains backported patches to resolve\nthese issues. Tomcat must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1617",
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1617.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server",
"tracking": {
"current_release_date": "2024-11-22T03:25:47+00:00",
"generator": {
"date": "2024-11-22T03:25:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2009:1617",
"initial_release_date": "2009-11-30T15:18:00+00:00",
"revision_history": [
{
"date": "2009-11-30T15:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-30T10:18:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T03:25:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product_id": "tomcat5-0:5.0.30-0jpp_16rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.0.30-0jpp_16rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product_id": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.0.30-0jpp_16rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch"
},
"product_reference": "tomcat5-0:5.0.30-0jpp_16rh.noarch",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.0.30-0jpp_16rh.src as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
},
"product_reference": "tomcat5-0:5.0.30-0jpp_16rh.src",
"relates_to_product_reference": "4AS-RHNSAT5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0783",
"discovery_date": "2009-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504153"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat XML parser information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0783"
},
{
"category": "external",
"summary": "RHBZ#504153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0783"
}
],
"release_date": "2009-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-30T15:18:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1617"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.noarch",
"4AS-RHNSAT5.1:tomcat5-0:5.0.30-0jpp_16rh.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat XML parser information disclosure"
}
]
}
RHSA-2010:0602
Vulnerability from csaf_redhat - Published: 2010-08-04 21:30 - Updated: 2026-01-28 22:51Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
CWE-125 - Out-of-bounds Read| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that fix multiple security issues and rebase various\ncomponents are now available for Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is an enterprise software system designed\nto manage enterprise Public Key Infrastructure (PKI) deployments.\n\nMultiple buffer overflow flaws were discovered in the way the pcscd daemon,\na resource manager that coordinates communications with smart card readers\nand smart cards connected to the system, handled client requests. A local\nuser could create a specially-crafted request that would cause the pcscd\ndaemon to crash or, possibly, execute arbitrary code. (CVE-2010-0407,\nCVE-2009-4901)\n\nThis erratum updates the Tomcat component shipped as part of Red Hat\nCertificate System to version 5.5.23, to address multiple security issues.\nIn a typical operating environment, Tomcat is not exposed to users of\nCertificate System in a vulnerable manner. These security updates will\nreduce risk in unique Certificate System environments. (CVE-2005-2090,\nCVE-2005-3510, CVE-2006-3835, CVE-2007-0450, CVE-2007-1358, CVE-2007-3382,\nCVE-2007-3385, CVE-2007-5461, CVE-2007-5333, CVE-2008-0128, CVE-2008-1232,\nCVE-2008-2370, CVE-2008-5515, CVE-2009-0033, CVE-2009-0580)\n\nThis erratum provides updated versions of the following components,\nrequired by the updated Tomcat version: ant, avalon-logkit, axis,\nclasspathx-jaf, classpathx-mail, geronimo-specs, jakarta-commons-modeler,\nlog4j, mx4j, xerces-j2, and xml-commons.\n\nA number of components have been updated to fix security issues for users\nof Red Hat Certificate System for the Solaris operating system. These fixes\nare for apr issue CVE-2009-2412; apr-util issues CVE-2009-0023,\nCVE-2009-1955, CVE-2009-1956, and CVE-2009-2412; httpd issues\nCVE-2006-3918, CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847,\nCVE-2007-4465, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2008-2364,\nCVE-2008-2939, CVE-2009-1891, CVE-2009-3094, CVE-2009-3095, and\nCVE-2010-0434; mod_perl issue CVE-2007-1349; and perl issues CVE-2007-5116\nand CVE-2008-1927.\n\nNote: Updated apr, apr-util, httpd, mod_perl, and perl packages were\npreviously available to users of Red Hat Certificate System for Red Hat\nEnterprise Linux via the Red Hat Enterprise Linux 4 channels on the Red Hat\nNetwork.\n\nAdditionally, the rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks,\nrhpki-java-tools, and rhpki-native-tools packages were updated to address\nsome anomalous behavior on the Solaris operating system. (BZ#600513,\nBZ#605760)\n\nAs well, this update provides an updated rhpki-manage package, which\nincludes installation and uninstall scripts for Red Hat Certificate System\nthat have been updated with the list of packages required by the Tomcat\ncomponent, and an updated dependency on the NSS and NSPR packages.\n\nAll users of Red Hat Certificate System are advised to upgrade to these\nupdated packages, which correct these issues. Refer to the Red Hat\nCertificate System Administration Guide, linked to in the References, for\ndetails on how to install the updated packages on the Solaris operating\nsystem. After installing this update, all Red Hat Certificate System\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthe update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0602",
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html",
"url": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html"
},
{
"category": "external",
"summary": "200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0602.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Certificate System 7.3 security update",
"tracking": {
"current_release_date": "2026-01-28T22:51:16+00:00",
"generator": {
"date": "2026-01-28T22:51:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2010:0602",
"initial_release_date": "2010-08-04T21:30:00+00:00",
"revision_history": [
{
"date": "2010-08-04T21:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-05T10:04:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4AS",
"product": {
"name": "Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4ES",
"product": {
"name": "Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_id": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_id": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_id": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_id": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-manage@7.3.0-19.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_id": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ca@7.3.0-20.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_id": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-kra@7.3.0-14.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-tks@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ocsp@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_id": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-java-tools@7.3.0-10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jms-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jta-1.0.1B-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-deployment-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-ejb-2.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-servlet-2.4-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs-javadoc@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-1.4-apis@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-connector-1.5-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jsp-2.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-management-1.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product_id": "ant-0:1.6.5-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product_id": "axis-0:1.2.1-1jpp_3rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product_id": "log4j-0:1.2.12-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product_id": "pcsc-lite-0:1.3.3-3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-2090",
"discovery_date": "2005-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237079"
}
],
"notes": [
{
"category": "description",
"text": "Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat multiple content-length header poisioning",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2090"
},
{
"category": "external",
"summary": "RHBZ#237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090"
}
],
"release_date": "2005-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat multiple content-length header poisioning"
},
{
"cve": "CVE-2005-3510",
"discovery_date": "2005-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237085"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat DoS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3510"
},
{
"category": "external",
"summary": "RHBZ#237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510"
}
],
"release_date": "2005-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat DoS"
},
{
"cve": "CVE-2006-3835",
"discovery_date": "2006-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237084"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory listing issue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.\n\nDetails on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3835"
},
{
"category": "external",
"summary": "RHBZ#237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3835",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835"
}
],
"release_date": "2006-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat directory listing issue"
},
{
"cve": "CVE-2006-3918",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2006-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200732"
}
],
"notes": [
{
"category": "description",
"text": "http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Expect header XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3918"
},
{
"category": "external",
"summary": "RHBZ#200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3918",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918"
}
],
"release_date": "2006-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Expect header XSS"
},
{
"cve": "CVE-2006-5752",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245112"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_status XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5752"
},
{
"category": "external",
"summary": "RHBZ#245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752"
}
],
"release_date": "2007-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_status XSS"
},
{
"cve": "CVE-2007-0450",
"discovery_date": "2007-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237080"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) \"/\" (slash), (2) \"\\\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory traversal",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0450"
},
{
"category": "external",
"summary": "RHBZ#237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450"
}
],
"release_date": "2007-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat directory traversal"
},
{
"cve": "CVE-2007-1349",
"discovery_date": "2007-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "240423"
}
],
"notes": [
{
"category": "description",
"text": "PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_perl PerlRun denial of service",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1349"
},
{
"category": "external",
"summary": "RHBZ#240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1349"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349"
}
],
"release_date": "2007-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mod_perl PerlRun denial of service"
},
{
"cve": "CVE-2007-1358",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244803"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted \"Accept-Language headers that do not conform to RFC 2616\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat accept-language xss flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1358"
},
{
"category": "external",
"summary": "RHBZ#244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358"
}
],
"release_date": "2007-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat accept-language xss flaw"
},
{
"cve": "CVE-2007-1863",
"discovery_date": "2007-05-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244658"
}
],
"notes": [
{
"category": "description",
"text": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_cache segfault",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1863"
},
{
"category": "external",
"summary": "RHBZ#244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1863",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863"
}
],
"release_date": "2007-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_cache segfault"
},
{
"cve": "CVE-2007-3304",
"discovery_date": "2007-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245111"
}
],
"notes": [
{
"category": "description",
"text": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd scoreboard lack of PID protection",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3304"
},
{
"category": "external",
"summary": "RHBZ#245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3304",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304"
}
],
"release_date": "2007-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd scoreboard lack of PID protection"
},
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-3847",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2007-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250731"
}
],
"notes": [
{
"category": "description",
"text": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: out of bounds read",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3847"
},
{
"category": "external",
"summary": "RHBZ#250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: out of bounds read"
},
{
"cve": "CVE-2007-4465",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-09-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "289511"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_autoindex XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is actually a flaw in browsers that do not derive the response character set as required by RFC 2616. This does not affect the default configuration of Apache httpd in Red Hat products and will only affect customers who have removed the \"AddDefaultCharset\" directive and are using directory indexes. The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4465"
},
{
"category": "external",
"summary": "RHBZ#289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465"
}
],
"release_date": "2007-09-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_autoindex XSS"
},
{
"cve": "CVE-2007-5000",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "419931"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_imagemap XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5000"
},
{
"category": "external",
"summary": "RHBZ#419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000"
}
],
"release_date": "2007-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_imagemap XSS"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy",
"Will Drewry"
]
}
],
"cve": "CVE-2007-5116",
"discovery_date": "2007-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "323571"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl regular expression UTF parsing errors",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5116"
},
{
"category": "external",
"summary": "RHBZ#323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116"
}
],
"release_date": "2007-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl regular expression UTF parsing errors"
},
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2007-6388",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427228"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache mod_status cross-site scripting",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6388"
},
{
"category": "external",
"summary": "RHBZ#427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388"
}
],
"release_date": "2007-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache mod_status cross-site scripting"
},
{
"cve": "CVE-2008-0005",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427739"
}
],
"notes": [
{
"category": "description",
"text": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_proxy_ftp XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0005"
},
{
"category": "external",
"summary": "RHBZ#427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005"
}
],
"release_date": "2008-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_proxy_ftp XSS"
},
{
"cve": "CVE-2008-0128",
"discovery_date": "2008-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "429821"
}
],
"notes": [
{
"category": "description",
"text": "The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat5 SSO cookie login information disclosure",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0128"
},
{
"category": "external",
"summary": "RHBZ#429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128"
}
],
"release_date": "2006-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat5 SSO cookie login information disclosure"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1927",
"discovery_date": "2008-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443928"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: heap corruption by regular expressions with utf8 characters",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1927"
},
{
"category": "external",
"summary": "RHBZ#443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927"
}
],
"release_date": "2007-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl: heap corruption by regular expressions with utf8 characters"
},
{
"cve": "CVE-2008-2364",
"discovery_date": "2008-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451615"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2364"
},
{
"category": "external",
"summary": "RHBZ#451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364"
}
],
"release_date": "2008-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2939",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458250"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp globbing XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2939"
},
{
"category": "external",
"summary": "RHBZ#458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939"
}
],
"release_date": "2008-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp globbing XSS"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0023",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503928"
}
],
"notes": [
{
"category": "description",
"text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util heap buffer underwrite",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0023"
},
{
"category": "external",
"summary": "RHBZ#503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util heap buffer underwrite"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-1955",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504555"
}
],
"notes": [
{
"category": "description",
"text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util billion laughs attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1955"
},
{
"category": "external",
"summary": "RHBZ#504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955"
}
],
"release_date": "2009-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util billion laughs attack"
},
{
"cve": "CVE-2009-1956",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504390"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util single NULL byte buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1956"
},
{
"category": "external",
"summary": "RHBZ#504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956"
}
],
"release_date": "2009-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util single NULL byte buffer overflow"
},
{
"cve": "CVE-2009-2412",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515698"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2412"
},
{
"category": "external",
"summary": "RHBZ#515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412"
}
],
"release_date": "2009-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management"
},
{
"cve": "CVE-2009-3094",
"discovery_date": "2009-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521619"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3094"
},
{
"category": "external",
"summary": "RHBZ#521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094"
}
],
"release_date": "2009-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply"
},
{
"cve": "CVE-2009-3095",
"discovery_date": "2009-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "522209"
}
],
"notes": [
{
"category": "description",
"text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3095"
},
{
"category": "external",
"summary": "RHBZ#522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095"
}
],
"release_date": "2009-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header"
},
{
"cve": "CVE-2009-4901",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4901"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0407",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0407"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0434",
"discovery_date": "2010-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "570171"
}
],
"notes": [
{
"category": "description",
"text": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: request header information leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0434"
},
{
"category": "external",
"summary": "RHBZ#570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: request header information leak"
}
]
}
FKIE_CVE-2009-0033
Vulnerability from fkie_nvd - Published: 2009-06-05 16:00 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E300013-0CE7-4313-A553-74A6A247B3E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E08D7414-8D0C-45D6-8E87-679DF0201D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60CFD9CA-1878-4C74-A9BD-5D581736E6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E52BE7-5281-4430-8846-E41CF34FC214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02860646-1D72-4D9A-AE2A-5868C8EDB3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE4B9B5-9C2E-47E1-9483-88A17264594F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE92A9B-4B8C-468E-9162-A56ED5313E17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AE21D455-5B38-4B07-8E25-4EE782501EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B9AE125C-EB8E-4D33-BB64-1E2AEE18BF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "47588ABB-FCE6-478D-BEAD-FC9A0C7D66DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "CBDA8066-294D-431E-B026-C03707DFBCD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C92F3744-C8F9-4E29-BF1A-25E03A32F2C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "084B3227-FE22-43E3-AE06-7BB257018690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D2BFF1D5-2E34-4A01-83A7-6AA3A112A1B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6D536FF4-7582-4351-ABE3-876E20F8E7FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FB43F47F-5BF9-43A0-BF0E-451B4A8F7137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFFE700-AAFE-4F5B-B0E2-C3DA76DE492D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "11DDD82E-5D83-4581-B2F3-F12655BBF817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0F0C91-171E-421D-BE86-11567DEFC7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F22D2621-D305-43CE-B00D-9A7563B061F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5D55E8-D3A3-4784-8AC6-CCB07E470AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4245BA-B05C-49DE-B2E0-1E588209ED3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8633532B-9785-4259-8840-B08529E20DCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D9BD7E-FCC2-404B-A057-1A10997DAFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F935ED72-58F4-49C1-BD9F-5473E0B9D8CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "FADB75DC-8713-4F0C-9F06-30DA6F6EF6B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA52901-2D16-4F7E-BF5E-780B42A55D6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "6A79DA2C-35F3-47DE-909B-8D8D1AE111C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF6952D-6308-4029-8B63-0BD9C648C60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "94941F86-0BBF-4F30-8F13-FB895A11ED69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "17522878-4266-432A-859D-C02096C8AC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "951FFCD7-EAC2-41E6-A53B-F90C540327E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1F2738-C7D6-4206-9227-43F464887FF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "98EEB6F2-A721-45CF-A856-0E01B043C317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "02FDE602-A56A-477E-B704-41AF92EEBB9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "5A28B11A-3BC7-41BC-8970-EE075B029F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD3E84C-9A2E-4586-A09E-CBDEB1E7F695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "6EF54C08-5FF1-4D02-AA16-B13096BD566C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F3B31D-8974-4016-ACAF-E7A917C99F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98B82A-22E5-4E6C-90AE-56F5780EA147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34672E90-C220-436B-9143-480941227933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92883AFA-A02F-41A5-9977-ABEAC8AD2970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "989A78F8-EE92-465F-8A8D-ECF0B58AFE7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFB09F3-32D1-479C-8C39-D7329D9A6623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D56581E2-9ECD-426A-96D8-A9D958900AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717F6995-5AF0-484C-90C0-A82F25FD2E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F67477AB-85F6-421C-9C0B-C8EFB1B200CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5D70CFD9-B55D-4A29-B94C-D33F3E881A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header."
},
{
"lang": "es",
"value": "Apache Tomcat v4.1.0 hasta v4.1.39, v5.5.0 hasta v5.5.27 y v6.0.0 hasta v6.0.18, cuando se utilizan el conector Java AJP y el balanceo de carga mod_jk; permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una solicitud manipulada con cabeceras inv\u00e1lidas. Est\u00e1 relacionado con el bloqueo temporal de los conectores que han encontrado errores, tal como se ha demostrado por un error que implica una cabecera HTTP Host mal formada."
}
],
"id": "CVE-2009-0033",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-06-05T16:00:00.187",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35326"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35344"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35685"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35788"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/42368"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1022331"
},
{
"source": "secalert@redhat.com",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT4077"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-4.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35193"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35685"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35788"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/42368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1022331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-4.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2009-0033
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-0033",
"description": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"id": "GSD-2009-0033",
"references": [
"https://www.suse.com/security/cve/CVE-2009-0033.html",
"https://www.debian.org/security/2011/dsa-2207",
"https://access.redhat.com/errata/RHSA-2010:0602",
"https://access.redhat.com/errata/RHSA-2009:1617",
"https://access.redhat.com/errata/RHSA-2009:1616",
"https://access.redhat.com/errata/RHSA-2009:1563",
"https://access.redhat.com/errata/RHSA-2009:1562",
"https://access.redhat.com/errata/RHSA-2009:1506",
"https://access.redhat.com/errata/RHSA-2009:1454",
"https://access.redhat.com/errata/RHSA-2009:1164",
"https://linux.oracle.com/cve/CVE-2009-0033.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0033"
],
"details": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"id": "GSD-2009-0033",
"modified": "2023-12-13T01:19:44.105984Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-0033",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://jvn.jp/en/jp/JVN87272440/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"name": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "http://secunia.com/advisories/35326",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35326"
},
{
"name": "http://secunia.com/advisories/35344",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35344"
},
{
"name": "http://secunia.com/advisories/35685",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35685"
},
{
"name": "http://secunia.com/advisories/35788",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35788"
},
{
"name": "http://secunia.com/advisories/37460",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37460"
},
{
"name": "http://secunia.com/advisories/42368",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42368"
},
{
"name": "http://securitytracker.com/id?1022331",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1022331"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1",
"refsource": "MISC",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"name": "http://support.apple.com/kb/HT4077",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT4077"
},
{
"name": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev",
"refsource": "MISC",
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"name": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev",
"refsource": "MISC",
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"name": "http://tomcat.apache.org/security-4.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-4.html"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "MISC",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "http://www.debian.org/security/2011/dsa-2207",
"refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "http://www.securityfocus.com/archive/1/504044/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/35193",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/35193"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1496",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1856",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3316",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "http://www.vupen.com/english/advisories/2010/3056",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-0033"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "35193",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35193"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "ADV-2009-1496",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1496"
},
{
"name": "35344",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35344"
},
{
"name": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"name": "1022331",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1022331"
},
{
"name": "35326",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35326"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "http://tomcat.apache.org/security-4.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-4.html"
},
{
"name": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"name": "JVN#87272440",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"name": "MDVSA-2009:138",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"name": "MDVSA-2009:136",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"name": "SUSE-SR:2009:012",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"name": "35685",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35685"
},
{
"name": "35788",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35788"
},
{
"name": "263529",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"name": "ADV-2009-1856",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1856"
},
{
"name": "FEDORA-2009-11356",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
},
{
"name": "FEDORA-2009-11374",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"name": "FEDORA-2009-11352",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "37460",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "APPLE-SA-2010-03-29-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT4077",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT4077"
},
{
"name": "MDVSA-2010:176",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"name": "HPSBUX02579",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"name": "ADV-2010-3056",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/3056"
},
{
"name": "42368",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/42368"
},
{
"name": "DSA-2207",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"name": "HPSBOV02762",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"name": "HPSBMA02535",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"name": "tomcat-ajp-dos(50928)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"name": "oval:org.mitre.oval:def:5739",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"name": "oval:org.mitre.oval:def:19110",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"name": "oval:org.mitre.oval:def:10231",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"name": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T01:17Z",
"publishedDate": "2009-06-05T16:00Z"
}
}
}
JVNDB-2009-000037
Vulnerability from jvndb - Published: 2009-06-18 17:54 - Updated:2012-09-28 13:40| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000037.html",
"dc:date": "2012-09-28T13:40+09:00",
"dcterms:issued": "2009-06-18T17:54+09:00",
"dcterms:modified": "2012-09-28T13:40+09:00",
"description": "Apache Tomcat from The Apache Software Foundation contains a denial of service (DoS) vulnerability.\r\n\r\nApache Tomcat from the Apache Software Foundation is an implementation of the Java Servlet and JavaServer Page (JSP) technologies.\r\nIf Tomcat receives a request with an invalid header via the Java AJP connector, it will not return an error and instead closes the AJP connection. In case this connector is member of a mod_jk load balancing worker, this member will be put into an error state and will be blocked from use for approximately one minute. Thus the behavior can be used for a denial of service attack using a carefully crafted request.\r\n\r\nAccording to the developer, unsupported Apache Tomcat 3.x, 4.0.x, and 5.0.x may also be affected.\r\nFor more information, refer to the developer\u0027s website.\r\n\r\nYoshihito Fukuyama of NTT OSS Center reported this vulnerability to IPA. JPCERT/CC coordinated with The Apache Software Foundation and the vendors under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000037.html",
"sec:cpe": [
{
"#text": "cpe:/a:apache:tomcat",
"@product": "Apache Tomcat",
"@vendor": "Apache Software Foundation",
"@version": "2.2"
},
{
"#text": "cpe:/a:hp:tomcat-based_servlet_engine",
"@product": "HP-UX Tomcat-based Servlet Engine",
"@vendor": "Hewlett-Packard Development Company,L.P",
"@version": "2.2"
},
{
"#text": "cpe:/a:nec:infoframe_documentskipper",
"@product": "InfoFrame DocumentSkipper",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/a:vmware:esx",
"@product": "VMware ESX",
"@vendor": "VMware",
"@version": "2.2"
},
{
"#text": "cpe:/a:vmware:server",
"@product": "VMware Server",
"@vendor": "VMware",
"@version": "2.2"
},
{
"#text": "cpe:/a:vmware:vcenter",
"@product": "VMware vCenter",
"@vendor": "VMware",
"@version": "2.2"
},
{
"#text": "cpe:/a:vmware:virtualcenter",
"@product": "VMware VirtualCenter",
"@vendor": "VMware",
"@version": "2.2"
},
{
"#text": "cpe:/o:apple:mac_os_x_server",
"@product": "Apple Mac OS X Server",
"@vendor": "Apple Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:hp:hp-ux",
"@product": "HP-UX",
"@vendor": "Hewlett-Packard Development Company,L.P",
"@version": "2.2"
},
{
"#text": "cpe:/o:misc:miraclelinux_asianux_server",
"@product": "Asianux Server",
"@vendor": "Cybertrust Japan Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux",
"@product": "Red Hat Enterprise Linux",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux_desktop",
"@product": "Red Hat Enterprise Linux Desktop",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux_eus",
"@product": "Red Hat Enterprise Linux EUS",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:rhel_desktop_workstation",
"@product": "RHEL Desktop Workstation",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:sun:opensolaris",
"@product": "OpenSolaris",
"@vendor": "Sun Microsystems, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:sun:solaris",
"@product": "Sun Solaris",
"@vendor": "Sun Microsystems, Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2009-000037",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN87272440/index.html",
"@id": "JVN#87272440",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033",
"@id": "CVE-2009-0033",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0033",
"@id": "CVE-2009-0033",
"@source": "NVD"
},
{
"#text": "http://secunia.com/advisories/35326",
"@id": "SA35326",
"@source": "SECUNIA"
},
{
"#text": "http://secunia.com/advisories/35344",
"@id": "SA35344",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/35193",
"@id": "35193",
"@source": "BID"
},
{
"#text": "http://xforce.iss.net/xforce/xfdb/50928",
"@id": "50928",
"@source": "XF"
},
{
"#text": "http://securitytracker.com/alerts/2009/Jun/1022331.html",
"@id": "1022331",
"@source": "SECTRACK"
},
{
"#text": "http://www.vupen.com/english/advisories/2009/1496",
"@id": "VUPEN/ADV-2009-1496",
"@source": "VUPEN"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-20",
"@title": "Improper Input Validation(CWE-20)"
}
],
"title": "Apache Tomcat denial of service (DoS) vulnerability"
}
GHSA-5CW4-GGX9-36VG
Vulnerability from github – Published: 2022-05-02 03:12 – Updated: 2024-01-23 17:52Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "4.1.0"
},
{
"last_affected": "4.1.39"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "5.5.0"
},
{
"last_affected": "5.5.27"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"last_affected": "6.0.18"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2009-0033"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-400"
],
"github_reviewed": true,
"github_reviewed_at": "2024-01-23T17:52:36Z",
"nvd_published_at": "2009-06-05T16:00:00Z",
"severity": "MODERATE"
},
"details": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"id": "GHSA-5cw4-ggx9-36vg",
"modified": "2024-01-23T17:52:36Z",
"published": "2022-05-02T03:12:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50928"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN87272440/index.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=129070310906557\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1022331"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4077"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?rev=742915\u0026view=rev"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?rev=781362\u0026view=rev"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-4.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2207"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:136"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:138"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/504044/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35193"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Apache Tomcat Denial of Service via Malformed Request Headers"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.