成人免费xxxxx在线视频软件_久久精品久久久_亚洲国产精品久久久_天天色天天色_亚洲人成一区_欧美一级欧美三级在线观看

Tomcat 又爆出兩個重要漏洞

開發 后端
在此之前Tomcat和Hashtable 碰撞拒絕服務漏洞,如今Tomcat 今天又爆出兩個新的重要的漏洞。Tomcat真是令人擔憂,詳情請看下文。

Tomcat 今天又爆出兩個新的重要的漏洞,這兩個漏洞分別是:

CVE-2011-337***pache Tomcat Information disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.21

◆ Tomcat 6.0.30 to 6.0.33

◆ Earlier versions are not affected

Description:

For performance reasons, information parsed from a request is often
cached in two places: the internal request object and the internal
processor object. These objects are not recycled at exactly the same time.
When certain errors occur that needed to be added to the access log, the
access logging process triggers the re-population of the request object
after it has been recycled. However, the request object was not recycled
before being used for the next request. That lead to information leakage
(e.g. remote IP address, HTTP headers) from the previous request to the
next request.
The issue was resolved be ensuring that the request and response objects
were recycled after being re-populated to generate the necessary access
log entries.

解決的辦法:

◆  Tomcat 7.0.x 用戶應該升級到 7.0.22 或者更新版本

◆ Tomcat 6.0.x 應該升級到 6.0.35 或更新版本

 

CVE-2012-0022 Apache Tomcat Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.22
◆ Tomcat 6.0.0 to 6.0.33
◆ Tomcat 5.5.0 to 5.5.34
◆ Earlier, unsupported versions may also be affected

Description:
Analysis of the recent hash collision vulnerability identified unrelated
inefficiencies with Apache Tomcat's handling of large numbers of
parameters and parameter values. These inefficiencies could allow an
attacker, via a specially crafted request, to cause large amounts of CPU
to be used which in turn could create a denial of service.
The issue was addressed by modifying the Tomcat parameter handling code
to efficiently process large numbers of parameters and parameter values.

Mitigation:

Users of affected versions should apply one of the following mitigations:

◆ Tomcat 7.0.x users should upgrade to 7.0.23 or later

◆ Tomcat 6.0.x users should upgrade to 6.0.35 or later

◆ Tomcat 5.5.x users should upgrade to 5.5.35 or later

【編輯推薦】

  1. Maven Web項目部署到Tomcat
  2. Tomcat和Hashtable 碰撞拒絕服務漏洞
  3. 將Eclipse RAP部署到Tomcat中
  4. Tomcat運行Java Web內存溢出總結
  5. Apache Tomcat 6.0.35 發布 附下載
責任編輯:林師授 來源: 51CTO
相關推薦

2018-10-17 09:47:38

微博搜索全面技術儲備

2017-06-14 10:02:22

2020-07-09 15:13:07

漏洞Spring ClouTomcat

2017-06-15 17:28:36

2013-03-15 10:15:21

2012-10-19 14:14:51

Ubuntu 12.1

2009-12-03 11:10:32

SMONARCHOracle

2022-02-27 13:16:09

漏洞網絡安全

2025-06-20 08:05:00

漏洞Linux黑客

2021-10-06 13:48:50

0day漏洞攻擊

2009-10-12 13:01:23

2021-04-08 09:31:45

FacebookFacebook fo漏洞

2019-07-11 05:53:48

MySQL死鎖數據

2010-08-19 11:22:19

marginpadding

2009-11-25 15:50:16

路由器調試

2012-05-22 20:46:57

2022-04-07 18:51:29

VMware漏洞網絡攻擊

2024-10-10 16:05:04

2024-03-06 13:27:23

2009-05-19 16:45:15

Linux安全漏洞補丁
點贊
收藏

51CTO技術棧公眾號

主站蜘蛛池模板: 一区免费看| 亚洲va国产日韩欧美精品色婷婷 | 人人亚洲 | 91精品国产综合久久久久 | 99精品国产一区二区青青牛奶 | 久久精品中文 | 国产成人精品一区二区三区网站观看 | 国产成人啪免费观看软件 | 国产精品免费高清 | 亚洲精品久久久久avwww潮水 | 91精品久久久 | 久久av资源网 | 亚洲精品国产一区 | 做a视频在线观看 | 亚洲永久精品国产 | 国精日本亚洲欧州国产中文久久 | 久久久久久免费精品一区二区三区 | 日韩精品一区二区三区高清免费 | 国产成人一区二区三区久久久 | 伊人免费网 | 成人欧美一区二区三区黑人孕妇 | 在线视频91| 亚洲一区二区三区桃乃木香奈 | 国产精品久久久久久影院8一贰佰 | 视频一区二区在线观看 | 97伦理电影 | 欧美成年黄网站色视频 | 99日韩 | 国产亚洲欧美在线视频 | 国产精品18久久久久久久 | 亚洲不卡在线观看 | 国产午夜亚洲精品不卡 | 欧美一级视频 | 国产日韩欧美精品 | 成人福利在线 | 欧美成人精品一区二区男人看 | 国产精品日韩欧美一区二区三区 | av男人的天堂在线 | 国产一区二区三区 | 欧美国产视频一区二区 | 午夜午夜精品一区二区三区文 |