CVE-2011-3190
Publication date 31 August 2011
Last updated 24 July 2024
Ubuntu priority
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat5.5 | ||
tomcat6 | ||
tomcat7 | ||
Patch details
Package | Patch details |
---|---|
tomcat5.5 | |
tomcat6 | |
tomcat7 |
References
Related Ubuntu Security Notices (USN)
- USN-1252-1
- Tomcat vulnerabilities
- 8 November 2011