Bug 493381 (CVE-2009-0033) - CVE-2009-0033 tomcat6 Denial-Of-Service with AJP connection
Summary: CVE-2009-0033 tomcat6 Denial-Of-Service with AJP connection
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-0033
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact: Pavel Kralik
URL:
Whiteboard:
Depends On: 503980 503981 504113 504115 528911 528912 528913 528914 533903 533905 574565 574566
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-04-01 15:54 UTC by Marc Schoenefeld
Modified: 2019-09-29 12:29 UTC (History)
11 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-25 20:10:14 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1164 0 normal SHIPPED_LIVE Important: tomcat security update 2009-07-21 20:56:29 UTC
Red Hat Product Errata RHSA-2009:1454 0 normal SHIPPED_LIVE Important: tomcat5 security update 2009-09-23 15:15:12 UTC
Red Hat Product Errata RHSA-2009:1506 0 normal SHIPPED_LIVE Important: tomcat6 security update 2009-10-14 16:15:15 UTC
Red Hat Product Errata RHSA-2009:1562 0 normal SHIPPED_LIVE Important: tomcat security update 2009-11-09 15:26:22 UTC
Red Hat Product Errata RHSA-2009:1563 0 normal SHIPPED_LIVE Important: tomcat security update 2009-11-09 15:37:31 UTC
Red Hat Product Errata RHSA-2009:1616 0 normal SHIPPED_LIVE Low: tomcat security update for Red Hat Network Satellite Server 2009-11-30 15:16:12 UTC
Red Hat Product Errata RHSA-2009:1617 0 normal SHIPPED_LIVE Low: tomcat security update for Red Hat Network Satellite Server 2009-11-30 15:18:07 UTC
Red Hat Product Errata RHSA-2010:0602 0 normal SHIPPED_LIVE Moderate: Red Hat Certificate System 7.3 security update 2010-08-05 14:04:51 UTC

Comment 2 Marc Schoenefeld 2009-06-03 16:05:12 UTC
If Tomcat receives a request with invalid headers via the Java AJP connector, it does not return an error and instead closes the AJP connection. In case this connector is member of a mod_jk load balancing worker, this member will be put into an error state and will be blocked from use for approximately one minute. Thus the behaviour can be used for a denial of service attack using a carefully crafted request.

Comment 4 Marc Schoenefeld 2009-06-03 16:53:53 UTC
Patchset for tomcat6: http://svn.apache.org/viewvc?view=rev&revision=742915
Patchset for tomcat5: http://svn.apache.org/viewvc?view=rev&revision=781362

Comment 7 errata-xmlrpc 2009-07-21 20:56:36 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1164 https://rhn.redhat.com/errata/RHSA-2009-1164.html

Comment 8 errata-xmlrpc 2009-09-21 15:51:49 UTC
This issue has been addressed in following products:

  JBEWS 1.0.0 for RHEL 4
  JBEWS 1.0.0 for RHEL 5

Via RHSA-2009:1454 https://rhn.redhat.com/errata/RHSA-2009-1454.html

Comment 12 errata-xmlrpc 2009-10-14 16:15:18 UTC
This issue has been addressed in following products:

  JBEWS 1.0.0 for RHEL 5
  JBEWS 1.0.0 for RHEL 4

Via RHSA-2009:1506 https://rhn.redhat.com/errata/RHSA-2009-1506.html

Comment 13 errata-xmlrpc 2009-11-09 15:26:26 UTC
This issue has been addressed in following products:

  RHAPS Version 2 for RHEL 4

Via RHSA-2009:1562 https://rhn.redhat.com/errata/RHSA-2009-1562.html

Comment 14 errata-xmlrpc 2009-11-09 15:37:34 UTC
This issue has been addressed in following products:

  Red Hat Developer Suite V.3

Via RHSA-2009:1563 https://rhn.redhat.com/errata/RHSA-2009-1563.html

Comment 20 errata-xmlrpc 2009-11-30 15:16:14 UTC
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.2
  Red Hat Network Satellite Server v 5.3

Via RHSA-2009:1616 https://rhn.redhat.com/errata/RHSA-2009-1616.html

Comment 21 errata-xmlrpc 2009-11-30 15:18:10 UTC
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.1

Via RHSA-2009:1617 https://rhn.redhat.com/errata/RHSA-2009-1617.html

Comment 24 errata-xmlrpc 2010-08-04 21:30:52 UTC
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Comment 25 Kurt Seifried 2011-10-25 20:10:14 UTC
All children bugs are closed, closing parent bug


Note You need to log in before you can comment on or make changes to this bug.