成人免费xxxxx在线视频软件_久久精品久久久_亚洲国产精品久久久_天天色天天色_亚洲人成一区_欧美一级欧美三级在线观看

Tomcat 又爆出兩個重要漏洞

開發 后端
在此之前Tomcat和Hashtable 碰撞拒絕服務漏洞,如今Tomcat 今天又爆出兩個新的重要的漏洞。Tomcat真是令人擔憂,詳情請看下文。

Tomcat 今天又爆出兩個新的重要的漏洞,這兩個漏洞分別是:

CVE-2011-337***pache Tomcat Information disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.21

◆ Tomcat 6.0.30 to 6.0.33

◆ Earlier versions are not affected

Description:

For performance reasons, information parsed from a request is often
cached in two places: the internal request object and the internal
processor object. These objects are not recycled at exactly the same time.
When certain errors occur that needed to be added to the access log, the
access logging process triggers the re-population of the request object
after it has been recycled. However, the request object was not recycled
before being used for the next request. That lead to information leakage
(e.g. remote IP address, HTTP headers) from the previous request to the
next request.
The issue was resolved be ensuring that the request and response objects
were recycled after being re-populated to generate the necessary access
log entries.

解決的辦法:

◆  Tomcat 7.0.x 用戶應該升級到 7.0.22 或者更新版本

◆ Tomcat 6.0.x 應該升級到 6.0.35 或更新版本

 

CVE-2012-0022 Apache Tomcat Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.22
◆ Tomcat 6.0.0 to 6.0.33
◆ Tomcat 5.5.0 to 5.5.34
◆ Earlier, unsupported versions may also be affected

Description:
Analysis of the recent hash collision vulnerability identified unrelated
inefficiencies with Apache Tomcat's handling of large numbers of
parameters and parameter values. These inefficiencies could allow an
attacker, via a specially crafted request, to cause large amounts of CPU
to be used which in turn could create a denial of service.
The issue was addressed by modifying the Tomcat parameter handling code
to efficiently process large numbers of parameters and parameter values.

Mitigation:

Users of affected versions should apply one of the following mitigations:

◆ Tomcat 7.0.x users should upgrade to 7.0.23 or later

◆ Tomcat 6.0.x users should upgrade to 6.0.35 or later

◆ Tomcat 5.5.x users should upgrade to 5.5.35 or later

【編輯推薦】

  1. Maven Web項目部署到Tomcat
  2. Tomcat和Hashtable 碰撞拒絕服務漏洞
  3. 將Eclipse RAP部署到Tomcat中
  4. Tomcat運行Java Web內存溢出總結
  5. Apache Tomcat 6.0.35 發布 附下載
責任編輯:林師授 來源: 51CTO
相關推薦

2013-03-15 10:15:21

2018-10-17 09:47:38

微博搜索全面技術儲備

2017-06-15 17:28:36

2017-06-14 10:02:22

2020-07-09 15:13:07

漏洞Spring ClouTomcat

2022-02-27 13:16:09

漏洞網絡安全

2021-10-06 13:48:50

0day漏洞攻擊

2012-10-19 14:14:51

Ubuntu 12.1

2009-12-03 11:10:32

SMONARCHOracle

2025-06-20 08:05:00

漏洞Linux黑客

2009-10-12 13:01:23

2012-05-22 20:46:57

2022-04-07 18:51:29

VMware漏洞網絡攻擊

2021-04-08 09:31:45

FacebookFacebook fo漏洞

2009-05-19 16:45:15

Linux安全漏洞補丁

2019-07-11 05:53:48

MySQL死鎖數據

2010-10-27 09:48:10

2010-08-19 11:22:19

marginpadding

2009-11-25 15:50:16

路由器調試

2024-10-10 16:05:04

點贊
收藏

51CTO技術棧公眾號

主站蜘蛛池模板: 91久久久久久 | 黄网免费| 日韩中文字幕在线不卡 | 特级生活片 | 亚洲欧美一区二区三区1000 | 福利片在线看 | 国产熟熟| 亚洲精品乱码久久久久久久久久 | 日韩欧美在线观看 | 国产精品免费一区二区三区四区 | 成年人在线 | 日韩一区中文字幕 | 99精品在线观看 | 国产精品一区二区av | 日本中出视频 | 99这里只有精品 | 亚洲精品一区国语对白 | 成人在线亚洲 | 日韩欧美专区 | 日本不卡免费新一二三区 | 天堂av中文 | 欧美电影免费观看 | 成人精品 | 国产一区二区三区 | 久久高清 | 成人免费视频网站在线看 | 国产一区二区三区久久 | 一区二区三区国产 | 人人干人人舔 | 色偷偷人人澡人人爽人人模 | 久久久999精品 | 日韩在线看片 | 国产精品亚洲二区 | 国产精品一区二区三区在线播放 | 国产真实乱对白精彩久久小说 | 嫩草影院黄 | 99精品一级欧美片免费播放 | 综合色在线| 91视频网址 | 国产亚洲人成a在线v网站 | 国产精品久久久久久久久久久久冷 |