Action not permitted
Modal body text goes here.
cve-2012-3544
Vulnerability from cvelistv5
Published
2013-06-01 10:00
Modified
2024-08-06 20:13
Severity ?
EPSS score ?
Summary
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:13:50.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "name": "59797", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59797" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tomcat.apache.org/security-7.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tomcat.apache.org/security-6.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "name": "USN-1841-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-13T16:10:03", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "name": "59797", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59797" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tomcat.apache.org/security-7.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tomcat.apache.org/security-6.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "name": "USN-1841-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3544", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "name": "59797", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59797" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "http://tomcat.apache.org/security-7.html", "refsource": "CONFIRM", "url": "http://tomcat.apache.org/security-7.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "name": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "name": "http://tomcat.apache.org/security-6.html", "refsource": "CONFIRM", "url": "http://tomcat.apache.org/security-6.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "name": "USN-1841-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3544", "datePublished": "2013-06-01T10:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:13:50.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-3544\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-06-01T14:21:05.750\",\"lastModified\":\"2023-11-07T02:11:37.457\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.\"},{\"lang\":\"es\",\"value\":\"Apache Tomcat v6.x anteriores a v6.0.37 y v7.x anteriores a v7.0.30 no gestionan de forma adecuada las extensiones troceadas, en la transferencia de trozos codificados, lo que permite a atacantes remotos a provocar una denegaci\u00f3n de servicio mediante datos en stream.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A354C34-A3FE-4B8A-9985-8874A0634BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE300CC-FD4A-444E-8506-E5E269D0A0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50A3EC9-516E-48A7-839B-A73F491B5B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C28F09D-5CAA-4CA7-A2B5-3B2820F5F409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC2FC75-97D2-4EA1-A1A0-F592A6D7C1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4871FD1-7F8C-4677-A80B-4A0BBC71DD7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AB969A-9ACE-44EF-B2E5-CEC008F47C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"06217215-72E4-4478-BACB-628A0836A645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA810F3F-ADD3-4D3F-9DFC-DBDD87B3079C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B79F2EA-C893-4359-80EC-24AE38D982E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B93A3A-D487-4CA1-8257-26F8FE287B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8802B2-57E0-4AA6-BC8E-00DE60468569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461DF95-18DC-4BF5-A703-7F19DA88DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823789C-2CB6-4300-94DB-BDBE83ABA8E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A61429EE-4331-430C-9830-58DCCBCBCB58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B3593F-CEDF-423C-90F8-F88EED87DC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7862B2-E1FA-4E16-92CD-8918AB461D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E03BE3-60CC-4415-B993-D0BB00F87A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E5E8C3-21AD-4230-B945-AB7DE66307B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4945C8C1-C71B-448B-9075-07C6C92599CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED4730B0-2E09-408B-AFD4-FE00F73700FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8C62EF-1B67-456A-9C66-755439CF8556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E9607B-4D28-460D-896B-E4B7FA22441E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A819E245-D641-4F19-9139-6C940504F6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C381275-10C5-4939-BCE3-0D1F3B3CB2EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A31CA0-A209-4C49-AA06-C38E165E5B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7205475A-6D04-4042-B24E-1DA5A57029B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08022987-B36B-4F63-88A5-A8F59195DF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA563BF-A67A-477D-956A-167ABEF885C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4B7557-EF35-451E-B55D-3296966695AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8980E61E-27BE-4858-82B3-C0E8128AF521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8756BF9B-3E24-4677-87AE-31CE776541F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88CE057E-2092-4C98-8D0C-75CF439D0A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F194580-EE6D-4E38-87F3-F0661262256B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9731BAA-4C6C-4259-B786-F577D8A90FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74A421-D019-4248-84B8-C70D4D9A8A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05346F5A-FB52-4376-AAC7-9A5308216545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305688F2-50A6-41FB-8614-BC589DB9A789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24AA431-C436-4AA5-85DF-B9AAFF2548FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25966344-15D5-4101-9346-B06BFD2DFFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F4CBAC-27B1-4EFF-955A-A63B457D0578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD55B338-9DBE-4643-ABED-A08964D3AF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D4F710E-06EA-48F4-AC6A-6F143950F015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4936C2-0B2D-4C44-98C3-443090965F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48453405-2319-4327-9F4C-6F70B49452C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DD9544-6424-41A6-AEC0-EC19B8A10E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4670E65-2E11-49A4-B661-57C2F60D411F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31002A23-4788-4BC7-AE11-A3C2AA31716D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D731065-626B-4425-8E49-F708DD457824\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Dec/23\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1378702\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1378921\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1476592\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/534161/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/59797\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/64758\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1841-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0012.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2013_1013
Vulnerability from csaf_redhat
Published
2013-07-03 16:18
Modified
2024-11-05 18:08
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
Notes
Topic
Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and
several bugs, is now available from the Red Hat Customer Portal for Red Hat
Enterprise Linux 5 and 6, Solaris, and Microsoft Windows.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
Native library.
This release serves as a replacement for Red Hat JBoss Web Server 2.0.0,
and includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1
Release Notes for information on the most significant of these changes,
available shortly from https://access.redhat.com/site/documentation/
The following security issues are also fixed with this release:
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_proxy_balancer module's manager web interface. If a remote attacker
could trick a user, who was logged into the manager web interface, into
visiting a specially-crafted URL, it would lead to arbitrary web script
execution in the context of the user's manager interface session.
(CVE-2012-4558)
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An
attacker could possibly use these flaws to perform XSS attacks if they were
able to make the victim's browser generate an HTTP request with a
specially-crafted Host header. (CVE-2012-3499)
A NULL pointer dereference flaw was found in the OCSP response verification
in OpenSSL. A malicious OCSP server could use this flaw to crash
applications performing OCSP verification by sending a specially-crafted
response. (CVE-2013-0166)
It was discovered that OpenSSL leaked timing information when decrypting
TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites
were used. A remote attacker could possibly use this flaw to retrieve plain
text from the encrypted packets by using a TLS/SSL or DTLS server as a
padding oracle. (CVE-2013-0169)
Note: CVE-2013-0166 and CVE-2013-0169 were only corrected in the packages
for Solaris and Windows. Updates for Red Hat Enterprise Linux can be
downloaded from the Red Hat Network.
A session fixation flaw was found in the Tomcat FormAuthenticator module.
During a narrow window of time, if a remote attacker sent requests while a
user was logging in, it could possibly result in the attacker's requests
being processed as if they were sent by the user. (CVE-2013-2067)
A denial of service flaw was found in the way the Tomcat chunked transfer
encoding input filter processed CRLF sequences. A remote attacker could
use this flaw to send an excessively long request, consuming network
bandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding
is enabled by default. (CVE-2012-3544)
A flaw was found in the way the Tomcat 7 asynchronous context
implementation performed request management in certain circumstances. If an
application used AsyncListeners and threw RuntimeExceptions, Tomcat could
send a reply that contains information from a different user's request,
possibly leading to the disclosure of sensitive information. This issue
only affected Tomcat 7. (CVE-2013-2071)
Warning: Before applying the update, back up your existing Red Hat JBoss
Web Server installation (including all applications and configuration
files).
All users of Red Hat JBoss Web Server 2.0.0 as provided from the Red Hat
Customer Portal are advised to upgrade to Red Hat JBoss Web Server 2.0.1,
which corrects these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available from the Red Hat Customer Portal for Red Hat\nEnterprise Linux 5 and 6, Solaris, and Microsoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA NULL pointer dereference flaw was found in the OCSP response verification\nin OpenSSL. A malicious OCSP server could use this flaw to crash\napplications performing OCSP verification by sending a specially-crafted\nresponse. (CVE-2013-0166)\n\nIt was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-0169)\n\nNote: CVE-2013-0166 and CVE-2013-0169 were only corrected in the packages\nfor Solaris and Windows. Updates for Red Hat Enterprise Linux can be\ndownloaded from the Red Hat Network.\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Web Server 2.0.1,\nwhich corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1013", "url": "https://access.redhat.com/errata/RHSA-2013:1013" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/", "url": "https://access.redhat.com/site/documentation/" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html", "url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html" }, { "category": "external", "summary": "907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "908052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052" }, { "category": "external", "summary": "915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1013.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update", "tracking": { "current_release_date": "2024-11-05T18:08:26+00:00", "generator": { "date": "2024-11-05T18:08:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1013", "initial_release_date": "2013-07-03T16:18:00+00:00", "revision_history": [ { "date": "2013-07-03T16:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-03T16:18:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:08:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 2.0", "product": { "name": "Red Hat JBoss Web Server 2.0", "product_id": "Red Hat JBoss Web Server 2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3499", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915883" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: multiple XSS flaws due to unescaped hostnames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3499" }, { "category": "external", "summary": "RHBZ#915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: multiple XSS flaws due to unescaped hostnames" }, { "cve": "CVE-2012-3544", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961783" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Limited DoS in chunked transfer encoding input filter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3544" }, { "category": "external", "summary": "RHBZ#961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Limited DoS in chunked transfer encoding input filter" }, { "cve": "CVE-2012-4558", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915884" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: XSS flaw in mod_proxy_balancer manager interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4558" }, { "category": "external", "summary": "RHBZ#915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: XSS flaw in mod_proxy_balancer manager interface" }, { "cve": "CVE-2013-0166", "discovery_date": "2013-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "908052" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DoS due to improper handling of OCSP response verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0166" }, { "category": "external", "summary": "RHBZ#908052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0166", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" } ], "release_date": "2013-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DoS due to improper handling of OCSP response verification" }, { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907589" } ], "notes": [ { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "RHBZ#907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" }, { "category": "workaround", "details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS", "product_ids": [ "Red Hat JBoss Web Server 2.0" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2013-2067", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961779" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Session fixation in form authenticator", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2067" }, { "category": "external", "summary": "RHBZ#961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Session fixation in form authenticator" }, { "cve": "CVE-2013-2071", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961803" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2071" }, { "category": "external", "summary": "RHBZ#961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T16:18:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1013" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions" } ] }
rhsa-2013_1012
Vulnerability from csaf_redhat
Published
2013-07-03 15:43
Modified
2024-11-05 18:08
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
Notes
Topic
Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and
several bugs, is now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
Native library.
This release serves as a replacement for Red Hat JBoss Web Server 2.0.0,
and includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1
Release Notes for information on the most significant of these changes,
available shortly from https://access.redhat.com/site/documentation/
The following security issues are also fixed with this release:
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_proxy_balancer module's manager web interface. If a remote attacker
could trick a user, who was logged into the manager web interface, into
visiting a specially-crafted URL, it would lead to arbitrary web script
execution in the context of the user's manager interface session.
(CVE-2012-4558)
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An
attacker could possibly use these flaws to perform XSS attacks if they were
able to make the victim's browser generate an HTTP request with a
specially-crafted Host header. (CVE-2012-3499)
A session fixation flaw was found in the Tomcat FormAuthenticator module.
During a narrow window of time, if a remote attacker sent requests while a
user was logging in, it could possibly result in the attacker's requests
being processed as if they were sent by the user. (CVE-2013-2067)
A denial of service flaw was found in the way the Tomcat chunked transfer
encoding input filter processed CRLF sequences. A remote attacker could
use this flaw to send an excessively long request, consuming network
bandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding
is enabled by default. (CVE-2012-3544)
A flaw was found in the way the Tomcat 7 asynchronous context
implementation performed request management in certain circumstances. If an
application used AsyncListeners and threw RuntimeExceptions, Tomcat could
send a reply that contains information from a different user's request,
possibly leading to the disclosure of sensitive information. This issue
only affected Tomcat 7. (CVE-2013-2071)
Note: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat
JBoss Web Server 1 installed.
Warning: Before applying the update, back up your existing Red Hat JBoss
Web Server installation (including all applications and configuration
files).
All users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 6
are advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server
process must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 6\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1012", "url": "https://access.redhat.com/errata/RHSA-2013:1012" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/", "url": "https://access.redhat.com/site/documentation/" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html", "url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html" }, { "category": "external", "summary": "915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1012.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update", "tracking": { "current_release_date": "2024-11-05T18:08:21+00:00", "generator": { "date": "2024-11-05T18:08:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1012", "initial_release_date": "2013-07-03T15:43:00+00:00", "revision_history": [ { "date": "2013-07-03T15:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-03T15:47:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:08:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "product": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "product": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "product": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "product": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "product": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "product": { "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el6.src", "product": { "name": "httpd-0:2.2.22-23.ep6.el6.src", "product_id": "httpd-0:2.2.22-23.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "product": { "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "product": { "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "product": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product": { "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "product": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "product": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product": { "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product": { "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_id": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-5_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-10_patch_01.ep6.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "product": { "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "product": { "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product": { "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "product": { "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "product": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "product": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el6.i386", "product": { "name": "httpd-0:2.2.22-23.ep6.el6.i386", "product_id": "httpd-0:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.22-23.ep6.el6.i386", "product": { "name": "httpd-devel-0:2.2.22-23.ep6.el6.i386", "product_id": "httpd-devel-0:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.22-23.ep6.el6.i386", "product": { "name": "httpd-tools-0:2.2.22-23.ep6.el6.i386", "product_id": "httpd-tools-0:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.22-23.ep6.el6.i386", "product": { "name": "mod_ssl-1:2.2.22-23.ep6.el6.i386", "product_id": "mod_ssl-1:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.22-23.ep6.el6.i386", "product": { "name": "httpd-manual-0:2.2.22-23.ep6.el6.i386", "product_id": "httpd-manual-0:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "product": { "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product": { "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product": { "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product": { "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el6.x86_64", "product": { "name": "httpd-0:2.2.22-23.ep6.el6.x86_64", "product_id": "httpd-0:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "product": { "name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "product_id": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "product": { "name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "product_id": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "product": { "name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "product_id": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "product": { "name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "product_id": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch" }, "product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src" }, "product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386" }, "product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64" }, "product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch" }, "product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src" }, "product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch" }, "product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch" }, "product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src" }, "product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch" }, "product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src" }, "product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386" }, "product_reference": "httpd-0:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src" }, "product_reference": "httpd-0:2.2.22-23.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "httpd-0:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386" }, "product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386" }, "product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386" }, "product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386" }, "product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch" }, "product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src" }, "product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch" }, "product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386" }, "product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64" }, "product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src" }, "product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386" }, "product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64" }, "product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386" }, "product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64" }, "product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386" }, "product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386" }, "product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386" }, "product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src" }, "product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src" }, "product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3499", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915883" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: multiple XSS flaws due to unescaped hostnames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3499" }, { "category": "external", "summary": "RHBZ#915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:43:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1012" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: multiple XSS flaws due to unescaped hostnames" }, { "cve": "CVE-2012-3544", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961783" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Limited DoS in chunked transfer encoding input filter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3544" }, { "category": "external", "summary": "RHBZ#961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:43:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1012" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Limited DoS in chunked transfer encoding input filter" }, { "cve": "CVE-2012-4558", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915884" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: XSS flaw in mod_proxy_balancer manager interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4558" }, { "category": "external", "summary": "RHBZ#915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:43:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1012" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: XSS flaw in mod_proxy_balancer manager interface" }, { "cve": "CVE-2013-2067", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961779" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Session fixation in form authenticator", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2067" }, { "category": "external", "summary": "RHBZ#961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:43:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1012" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Session fixation in form authenticator" }, { "cve": "CVE-2013-2071", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961803" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2071" }, { "category": "external", "summary": "RHBZ#961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:43:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1012" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src", "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch", "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src", "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch", "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386", "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src", "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386", "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions" } ] }
rhsa-2013_1011
Vulnerability from csaf_redhat
Published
2013-07-03 15:38
Modified
2024-11-05 18:08
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
Notes
Topic
Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and
several bugs, is now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
Native library.
This release serves as a replacement for Red Hat JBoss Web Server 2.0.0,
and includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1
Release Notes for information on the most significant of these changes,
available shortly from https://access.redhat.com/site/documentation/
The following security issues are also fixed with this release:
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_proxy_balancer module's manager web interface. If a remote attacker
could trick a user, who was logged into the manager web interface, into
visiting a specially-crafted URL, it would lead to arbitrary web script
execution in the context of the user's manager interface session.
(CVE-2012-4558)
Cross-site scripting (XSS) flaws were found in the Apache HTTP Server
mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An
attacker could possibly use these flaws to perform XSS attacks if they were
able to make the victim's browser generate an HTTP request with a
specially-crafted Host header. (CVE-2012-3499)
A session fixation flaw was found in the Tomcat FormAuthenticator module.
During a narrow window of time, if a remote attacker sent requests while a
user was logging in, it could possibly result in the attacker's requests
being processed as if they were sent by the user. (CVE-2013-2067)
A denial of service flaw was found in the way the Tomcat chunked transfer
encoding input filter processed CRLF sequences. A remote attacker could
use this flaw to send an excessively long request, consuming network
bandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding
is enabled by default. (CVE-2012-3544)
A flaw was found in the way the Tomcat 7 asynchronous context
implementation performed request management in certain circumstances. If an
application used AsyncListeners and threw RuntimeExceptions, Tomcat could
send a reply that contains information from a different user's request,
possibly leading to the disclosure of sensitive information. This issue
only affected Tomcat 7. (CVE-2013-2071)
Note: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat
JBoss Web Server 1 installed.
Warning: Before applying the update, back up your existing Red Hat JBoss
Web Server installation (including all applications and configuration
files).
All users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 5
are advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server
process must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 5\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1011", "url": "https://access.redhat.com/errata/RHSA-2013:1011" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/", "url": "https://access.redhat.com/site/documentation/" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html", "url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html" }, { "category": "external", "summary": "915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1011.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update", "tracking": { "current_release_date": "2024-11-05T18:08:17+00:00", "generator": { "date": "2024-11-05T18:08:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1011", "initial_release_date": "2013-07-03T15:38:00+00:00", "revision_history": [ { "date": "2013-07-03T15:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-07-03T15:47:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:08:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el5.x86_64", "product": { "name": "httpd-0:2.2.22-23.ep6.el5.x86_64", "product_id": "httpd-0:2.2.22-23.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "product_id": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "product": { "name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "product_id": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "product_id": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "product_id": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "product": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "product": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el5.i386", "product": { "name": "httpd-0:2.2.22-23.ep6.el5.i386", "product_id": "httpd-0:2.2.22-23.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.22-23.ep6.el5.i386", "product": { "name": "httpd-devel-0:2.2.22-23.ep6.el5.i386", "product_id": "httpd-devel-0:2.2.22-23.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.22-23.ep6.el5.i386", "product": { "name": "httpd-tools-0:2.2.22-23.ep6.el5.i386", "product_id": "httpd-tools-0:2.2.22-23.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.22-23.ep6.el5.i386", "product": { "name": "mod_ssl-1:2.2.22-23.ep6.el5.i386", "product_id": "mod_ssl-1:2.2.22-23.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.22-23.ep6.el5.i386", "product": { "name": "httpd-manual-0:2.2.22-23.ep6.el5.i386", "product_id": "httpd-manual-0:2.2.22-23.ep6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "product": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "product": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "product": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "product": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "product": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "product": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "product": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "product": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "product": { "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "httpd-0:2.2.22-23.ep6.el5.src", "product": { "name": "httpd-0:2.2.22-23.ep6.el5.src", "product_id": "httpd-0:2.2.22-23.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "product": { "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "product": { "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "product": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "product": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product": { "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product": { "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product": { "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "product": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "product": { "name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_id": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-8_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "product": { "name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_id": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-9_patch_01.ep6.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch" }, "product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src" }, "product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64" }, "product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch" }, "product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src" }, "product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch" }, "product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch" }, "product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src" }, "product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch" }, "product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src" }, "product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386" }, "product_reference": "httpd-0:2.2.22-23.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src" }, "product_reference": "httpd-0:2.2.22-23.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64" }, "product_reference": "httpd-0:2.2.22-23.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386" }, "product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386" }, "product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386" }, "product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64" }, "product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch" }, "product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src" }, "product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch" }, "product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64" }, "product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch" }, "product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src" }, "product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386" }, "product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64" }, "product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386" }, "product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64" }, "product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386" }, "product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64" }, "product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src" }, "product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src" }, "product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server", "product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3499", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915883" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: multiple XSS flaws due to unescaped hostnames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3499" }, { "category": "external", "summary": "RHBZ#915883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1011" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: multiple XSS flaws due to unescaped hostnames" }, { "cve": "CVE-2012-3544", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961783" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Limited DoS in chunked transfer encoding input filter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3544" }, { "category": "external", "summary": "RHBZ#961783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1011" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Limited DoS in chunked transfer encoding input filter" }, { "cve": "CVE-2012-4558", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "915884" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: XSS flaw in mod_proxy_balancer manager interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4558" }, { "category": "external", "summary": "RHBZ#915884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558" } ], "release_date": "2013-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1011" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: XSS flaw in mod_proxy_balancer manager interface" }, { "cve": "CVE-2013-2067", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961779" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Session fixation in form authenticator", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2067" }, { "category": "external", "summary": "RHBZ#961779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1011" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Session fixation in form authenticator" }, { "cve": "CVE-2013-2071", "discovery_date": "2013-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "961803" } ], "notes": [ { "category": "description", "text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2071" }, { "category": "external", "summary": "RHBZ#961803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071" } ], "release_date": "2013-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-07-03T15:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1011" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src", "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src", "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch", "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src", "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch", "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386", "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src", "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src", "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch", "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions" } ] }
gsd-2012-3544
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-3544", "description": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "id": "GSD-2012-3544", "references": [ "https://www.suse.com/security/cve/CVE-2012-3544.html", "https://www.debian.org/security/2013/dsa-2725", "https://access.redhat.com/errata/RHSA-2013:1013", "https://access.redhat.com/errata/RHSA-2013:1012", "https://access.redhat.com/errata/RHSA-2013:1011", "https://advisories.mageia.org/CVE-2012-3544.html", "https://alas.aws.amazon.com/cve/html/CVE-2012-3544.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-3544" ], "details": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "id": "GSD-2012-3544", "modified": "2023-12-13T01:20:21.249265Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3544", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "name": "59797", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59797" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "http://tomcat.apache.org/security-7.html", "refsource": "CONFIRM", "url": "http://tomcat.apache.org/security-7.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "name": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "name": "http://tomcat.apache.org/security-6.html", "refsource": "CONFIRM", "url": "http://tomcat.apache.org/security-6.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "name": "USN-1841-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3544" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://tomcat.apache.org/security-7.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://tomcat.apache.org/security-7.html" }, { "name": "http://tomcat.apache.org/security-6.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://tomcat.apache.org/security-6.html" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "name": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "name": "USN-1841-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "name": "20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited", "refsource": "BUGTRAQ", "tags": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "name": "64758", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "59797", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/59797" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2019-04-15T16:29Z", "publishedDate": "2013-06-01T14:21Z" } } }
ghsa-qfxv-3ppc-7qg5
Vulnerability from github
Published
2022-05-14 01:10
Modified
2022-05-14 01:10
Details
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
{ "affected": [], "aliases": [ "CVE-2012-3544" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-06-01T14:21:00Z", "severity": "MODERATE" }, "details": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.", "id": "GHSA-qfxv-3ppc-7qg5", "modified": "2022-05-14T01:10:36Z", "published": "2022-05-14T01:10:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592\u0026r2=1476591\u0026pathrev=1476592" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378702" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1378921" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1476592" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-7.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/59797" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/64758" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1841-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.