Vulnerabilities > CVE-2012-5568
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_TOMCAT5-8397.NASL description This update of tomcat5 fixed the following security issues : - tomcat: cnonce tracking weakness. (CVE-2012-5885) - tomcat: stale nonce weakness. (CVE-2012-5887) - tomcat: authentication caching weakness. (CVE-2012-5886) - tomcat: affected by slowloris DoS. (CVE-2012-5568) - tomcat: Bypass of security constraints. (CVE-2012-3546) last seen 2020-06-05 modified 2013-02-04 plugin id 64431 published 2013-02-04 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/64431 title SuSE 10 Security Update : tomcat5 (ZYPP Patch Number 8397) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(64431); script_version("1.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2012-3546", "CVE-2012-5568", "CVE-2012-5885", "CVE-2012-5886", "CVE-2012-5887"); script_name(english:"SuSE 10 Security Update : tomcat5 (ZYPP Patch Number 8397)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "This update of tomcat5 fixed the following security issues : - tomcat: cnonce tracking weakness. (CVE-2012-5885) - tomcat: stale nonce weakness. (CVE-2012-5887) - tomcat: authentication caching weakness. (CVE-2012-5886) - tomcat: affected by slowloris DoS. (CVE-2012-5568) - tomcat: Bypass of security constraints. (CVE-2012-3546)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-3546.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5568.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5885.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5886.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5887.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 8397."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2012/12/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/04"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLES10", sp:4, reference:"tomcat5-5.5.27-0.22.1")) flag++; if (rpm_check(release:"SLES10", sp:4, reference:"tomcat5-admin-webapps-5.5.27-0.22.1")) flag++; if (rpm_check(release:"SLES10", sp:4, reference:"tomcat5-webapps-5.5.27-0.22.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else exit(0, "The host is not affected.");
NASL family SuSE Local Security Checks NASL id SUSE_11_TOMCAT6-130107.NASL description This update of tomcat6 fixes the following security issues : - denial of service. (CVE-2012-4534) - tomcat: HTTP NIO connector OOM DoS via a request with large headers. (CVE-2012-2733) - tomcat: cnonce tracking weakness. (CVE-2012-5885) - tomcat: authentication caching weakness. (CVE-2012-5886) - tomcat: stale nonce weakness. (CVE-2012-5887) - tomcat: affected by slowloris DoS. (CVE-2012-5568) - tomcat: Bypass of security constraints. (CVE-2012-3546) - tomcat: bypass of CSRF prevention filter. (CVE-2012-4431) last seen 2020-06-05 modified 2013-02-04 plugin id 64430 published 2013-02-04 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/64430 title SuSE 11.2 Security Update : tomcat6 (SAT Patch Number 7208) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SuSE 11 update information. The text itself is # copyright (C) Novell, Inc. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(64430); script_version("1.9"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2012-2733", "CVE-2012-3546", "CVE-2012-4431", "CVE-2012-4534", "CVE-2012-5568", "CVE-2012-5885", "CVE-2012-5886", "CVE-2012-5887"); script_name(english:"SuSE 11.2 Security Update : tomcat6 (SAT Patch Number 7208)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 11 host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update of tomcat6 fixes the following security issues : - denial of service. (CVE-2012-4534) - tomcat: HTTP NIO connector OOM DoS via a request with large headers. (CVE-2012-2733) - tomcat: cnonce tracking weakness. (CVE-2012-5885) - tomcat: authentication caching weakness. (CVE-2012-5886) - tomcat: stale nonce weakness. (CVE-2012-5887) - tomcat: affected by slowloris DoS. (CVE-2012-5568) - tomcat: Bypass of security constraints. (CVE-2012-3546) - tomcat: bypass of CSRF prevention filter. (CVE-2012-4431)" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=789406" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791423" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791424" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791426" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791679" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=793391" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=793394" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=794548" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-2733.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-3546.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-4431.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-4534.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5568.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5885.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5886.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2012-5887.html" ); script_set_attribute(attribute:"solution", value:"Apply SAT patch number 7208."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-admin-webapps"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-docs-webapp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-javadoc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-jsp-2_1-api"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-lib"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-servlet-2_5-api"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:tomcat6-webapps"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11"); script_set_attribute(attribute:"patch_publication_date", value:"2013/01/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/04"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11"); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu); pl = get_kb_item("Host/SuSE/patchlevel"); if (isnull(pl) || int(pl) != 2) audit(AUDIT_OS_NOT, "SuSE 11.2"); flag = 0; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-admin-webapps-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-docs-webapp-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-javadoc-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-jsp-2_1-api-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-lib-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-servlet-2_5-api-6.0.18-20.35.40.1")) flag++; if (rpm_check(release:"SLES11", sp:2, reference:"tomcat6-webapps-6.0.18-20.35.40.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id OPENSUSE-2012-883.NASL description - fix bnc#793394 - bypass of security constraints (CVE-2012-3546) - tomcat-CVE-2012-3546.patch http://svn.apache.org/viewvc?view=revision&revision=1377 892 - fix bnc#793391 - bypass of CSRF prevention filter (CVE-2012-4431) - tomcat-CVE-2012-4431.patch http://svn.apache.org/viewvc?view=revision&revision=1393 088 - document how to protect against slowloris DoS (CVE-2012-5568/bnc#791679) in README.SUSE - fixes bnc#791423 - cnonce tracking weakness (CVE-2012-5885) bnc#791424 - authentication caching weakness (CVE-2012-5886) bnc#791426 - stale nonce weakness (CVE-2012-5887) - tomcat-dont-parse-user-name-twice.patch http://svn.apache.org/viewvc?view=revision&revision=1366 723 - tomcat-CVE-2009-2693-CVE-2009-2901-CVE-2009-2902.patch http://svn.apache.org/viewvc?view=revision&revision=1377 807 - fix bnc#789406: HTTP NIO connector OOM DoS via a request with large headers (CVE-2012-2733) - http://svn.apache.org/viewvc?view=revision&revision=1350301 - fix bnc#779538 - Tomcat7 default current workdir isn last seen 2020-06-05 modified 2014-06-13 plugin id 74853 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/74853 title openSUSE Security Update : tomcat (openSUSE-SU-2012:1701-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2012-883. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(74853); script_version("1.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2009-2693", "CVE-2009-2901", "CVE-2009-2902", "CVE-2012-2733", "CVE-2012-3546", "CVE-2012-4431", "CVE-2012-5568", "CVE-2012-5885", "CVE-2012-5886", "CVE-2012-5887"); script_name(english:"openSUSE Security Update : tomcat (openSUSE-SU-2012:1701-1)"); script_summary(english:"Check for the openSUSE-2012-883 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: " - fix bnc#793394 - bypass of security constraints (CVE-2012-3546) - tomcat-CVE-2012-3546.patch http://svn.apache.org/viewvc?view=revision&revision=1377 892 - fix bnc#793391 - bypass of CSRF prevention filter (CVE-2012-4431) - tomcat-CVE-2012-4431.patch http://svn.apache.org/viewvc?view=revision&revision=1393 088 - document how to protect against slowloris DoS (CVE-2012-5568/bnc#791679) in README.SUSE - fixes bnc#791423 - cnonce tracking weakness (CVE-2012-5885) bnc#791424 - authentication caching weakness (CVE-2012-5886) bnc#791426 - stale nonce weakness (CVE-2012-5887) - tomcat-dont-parse-user-name-twice.patch http://svn.apache.org/viewvc?view=revision&revision=1366 723 - tomcat-CVE-2009-2693-CVE-2009-2901-CVE-2009-2902.patch http://svn.apache.org/viewvc?view=revision&revision=1377 807 - fix bnc#789406: HTTP NIO connector OOM DoS via a request with large headers (CVE-2012-2733) - http://svn.apache.org/viewvc?view=revision&revision=1350301 - fix bnc#779538 - Tomcat7 default current workdir isn't /usr/share/tomcat" ); script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1350301" ); script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1366723" ); script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1377807" ); script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1377892" ); script_set_attribute( attribute:"see_also", value:"http://svn.apache.org/viewvc?view=revision&revision=1393088" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=779538" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=789406" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791423" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791424" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791426" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=791679" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=793391" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=793394" ); script_set_attribute( attribute:"see_also", value:"https://lists.opensuse.org/opensuse-updates/2012-12/msg00062.html" ); script_set_attribute( attribute:"solution", value:"Update the affected tomcat packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P"); script_cwe_id(22, 264); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-admin-webapps"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-docs-webapp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-el-2_2-api"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-javadoc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-jsp-2_2-api"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-jsvc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-lib"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-servlet-3_0-api"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:tomcat-webapps"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.2"); script_set_attribute(attribute:"patch_publication_date", value:"2012/12/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE12\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-admin-webapps-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-docs-webapp-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-el-2_2-api-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-javadoc-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-jsp-2_2-api-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-jsvc-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-lib-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-servlet-3_0-api-7.0.27-2.9.1") ) flag++; if ( rpm_check(release:"SUSE12.2", reference:"tomcat-webapps-7.0.27-2.9.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tomcat / tomcat-admin-webapps / tomcat-docs-webapp / etc"); }
NASL family Misc. NASL id JUNIPER_NSM_2012_2_R5.NASL description According to the version of one or more Juniper NSM servers running on the remote host, it is potentially affected by the following vulnerabilities related to the included Apache Tomcat version : - An error exists related to handling requests containing several parameters that could allow denial of service attacks. (CVE-2012-0022) - An error exists related to handling partial HTTP requests that could allow denial of service attacks. (CVE-2012-5568) - Errors exist related to handling DIGEST authentication that could allow security mechanisms to be bypassed. (CVE-2012-5885, CVE-2012-5886, CVE-2012-5887) last seen 2020-06-01 modified 2020-06-02 plugin id 71023 published 2013-11-21 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/71023 title Juniper NSM Servers < 2012.2R5 Multiple Vulnerabilities NASL family SuSE Local Security Checks NASL id OPENSUSE-2012-884.NASL description - fix bnc#793394 - bypass of security constraints (CVE-2012-3546) - apache-tomcat-CVE-2012-3546.patch http://svn.apache.org/viewvc?view=revision&revision=1381 035 - fix bnc#793391 - bypass of CSRF prevention filter (CVE-2012-4431) - apache-tomcat-CVE-2012-4431.patch http://svn.apache.org/viewvc?view=revision&revision=1394 456 - document how to protect against slowloris DoS (CVE-2012-5568/bnc#791679) in README.SUSE - fixes bnc#791423 - cnonce tracking weakness (CVE-2012-5885) bnc#791424 - authentication caching weakness (CVE-2012-5886) bnc#791426 - stale nonce weakness (CVE-2012-5887) - apache-tomcat-CVE-2009-2693-CVE-2009-2901-CVE-2009-2902. patch http://svn.apache.org/viewvc?view=revision&revision=1380 829 - fix bnc#789406 - HTTP NIO connector OOM DoS via a request with large headers (CVE-2012-2733) - http://svn.apache.org/viewvc?view=revision&revision=1356208 last seen 2020-06-05 modified 2014-06-13 plugin id 74854 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/74854 title openSUSE Security Update : tomcat6 (openSUSE-SU-2012:1700-1)
Seebug
bulletinFamily | exploit |
description | Bugtraq ID:56686 CVE ID:CVE-2012-5568 Apache Tomcat是一款开放源码的JSP应用服务器程序。 Apache Tomcat存在一个安全漏洞,攻击者缓慢的连续发送头字段接着头字段请求,可导致服务器消耗系统资源,如线程资源,造成拒绝服务攻击。 Slowloris拒绝服务攻击工具可触发此漏洞。 0 Apache Software Foundation Tomcat 7.0.x Apache Software Foundation Tomcat 6.0.x Apache Software Foundation Tomcat 5.x Apache Software Foundation Tomcat 4.x 厂商解决方案 目前没有详细解决方案提供: http://tomcat.apache.org/ |
id | SSV:60480 |
last seen | 2017-11-19 |
modified | 2012-11-29 |
published | 2012-11-29 |
reporter | Root |
title | Apache Tomcat 拒绝服务漏洞(CVE-2012-5568) |
References
- http://captainholly.wordpress.com/2009/06/19/slowloris-vs-tomcat/
- http://captainholly.wordpress.com/2009/06/19/slowloris-vs-tomcat/
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
- http://openwall.com/lists/oss-security/2012/11/26/2
- http://openwall.com/lists/oss-security/2012/11/26/2
- http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147776.html
- http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147776.html
- http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147779.html
- http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147779.html
- http://www.securityfocus.com/bid/56686
- http://www.securityfocus.com/bid/56686
- https://bugzilla.redhat.com/show_bug.cgi?id=880011
- https://bugzilla.redhat.com/show_bug.cgi?id=880011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80317
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80317