Vulnerability Description
Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | 4.1.0 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN30732239/index.html
- http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
- http://secunia.com/advisories/32213Vendor Advisory
- http://secunia.com/advisories/32234Vendor Advisory
- http://secunia.com/advisories/32398Vendor Advisory
- http://secunia.com/advisories/35684
- http://securityreason.com/securityalert/4396
- http://tomcat.apache.org/security-4.htmlVendor Advisory
- http://tomcat.apache.org/security-5.html
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-20
- http://www.nec.co.jp/security-info/secinfo/nv09-006.html
- http://www.securityfocus.com/archive/1/497220/100/0/threaded
- http://www.securityfocus.com/bid/31698
- http://www.securitytracker.com/id?1021039
FAQ
What is CVE-2008-3271?
CVE-2008-3271 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another requ...
How severe is CVE-2008-3271?
CVE-2008-3271 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3271?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat.