新聞中心
Tomcat 今天又爆出兩個(gè)新的重要的漏洞,這兩個(gè)漏洞分別是:

在嵐縣等地區(qū),都構(gòu)建了全面的區(qū)域性戰(zhàn)略布局,加強(qiáng)發(fā)展的系統(tǒng)性、市場(chǎng)前瞻性、產(chǎn)品創(chuàng)新能力,以專注、極致的服務(wù)理念,為客戶提供成都網(wǎng)站設(shè)計(jì)、成都網(wǎng)站建設(shè) 網(wǎng)站設(shè)計(jì)制作按需定制開發(fā),公司網(wǎng)站建設(shè),企業(yè)網(wǎng)站建設(shè),成都品牌網(wǎng)站建設(shè),成都全網(wǎng)營(yíng)銷推廣,外貿(mào)網(wǎng)站制作,嵐縣網(wǎng)站建設(shè)費(fèi)用合理。
CVE-2011-337***pache Tomcat Information disclosure
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
◆ Tomcat 7.0.0 to 7.0.21
◆ Tomcat 6.0.30 to 6.0.33
◆ Earlier versions are not affected
Description:
For performance reasons, information parsed from a request is often
cached in two places: the internal request object and the internal
processor object. These objects are not recycled at exactly the same time.
When certain errors occur that needed to be added to the access log, the
access logging process triggers the re-population of the request object
after it has been recycled. However, the request object was not recycled
before being used for the next request. That lead to information leakage
(e.g. remote IP address, HTTP headers) from the previous request to the
next request.
The issue was resolved be ensuring that the request and response objects
were recycled after being re-populated to generate the necessary access
log entries.
解決的辦法:
◆ Tomcat 7.0.x 用戶應(yīng)該升級(jí)到 7.0.22 或者更新版本
◆ Tomcat 6.0.x 應(yīng)該升級(jí)到 6.0.35 或更新版本
CVE-2012-0022 Apache Tomcat Denial of Service
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
◆ Tomcat 7.0.0 to 7.0.22
◆ Tomcat 6.0.0 to 6.0.33
◆ Tomcat 5.5.0 to 5.5.34
◆ Earlier, unsupported versions may also be affected
Description:
Analysis of the recent hash collision vulnerability identified unrelated
inefficiencies with Apache Tomcat's handling of large numbers of
parameters and parameter values. These inefficiencies could allow an
attacker, via a specially crafted request, to cause large amounts of CPU
to be used which in turn could create a denial of service.
The issue was addressed by modifying the Tomcat parameter handling code
to efficiently process large numbers of parameters and parameter values.
Mitigation:
Users of affected versions should apply one of the following mitigations:
◆ Tomcat 7.0.x users should upgrade to 7.0.23 or later
◆ Tomcat 6.0.x users should upgrade to 6.0.35 or later
◆ Tomcat 5.5.x users should upgrade to 5.5.35 or later
網(wǎng)頁(yè)標(biāo)題:Tomcat又爆出兩個(gè)重要漏洞
當(dāng)前網(wǎng)址:http://www.dlmjj.cn/article/cdcdisj.html


咨詢
建站咨詢
