中文字幕av专区_日韩电影在线播放_精品国产精品久久一区免费式_av在线免费观看网站

溫馨提示×

溫馨提示×

您好,登錄后才能下訂單哦!

密碼登錄×
登錄注冊×
其他方式登錄
點擊 登錄注冊 即表示同意《億速云用戶服務條款》

Tomcat兩個重要漏洞的示例分析

發布時間:2021-10-29 10:17:04 來源:億速云 閱讀:163 作者:柒染 欄目:編程語言

本篇文章給大家分享的是有關Tomcat兩個重要漏洞的示例分析,小編覺得挺實用的,因此分享給大家學習,希望大家閱讀完這篇文章后可以有所收獲,話不多說,跟著小編一起來看看吧。

Tomcat 今天又爆出兩個新的重要的漏洞,這兩個漏洞分別是:

CVE-2011-337***pache Tomcat Information disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.21

◆ Tomcat 6.0.30 to 6.0.33

◆ Earlier versions are not affected

Description:

For performance reasons, information parsed from a request is often
cached in two places: the internal request object and the internal
processor object. These objects are not recycled at exactly the same time.
When certain errors occur that needed to be added to the access log, the
access logging process triggers the re-population of the request object
after it has been recycled. However, the request object was not recycled
before being used for the next request. That lead to information leakage
(e.g. remote IP address, HTTP headers) from the previous request to the
next request.
The issue was resolved be ensuring that the request and response objects
were recycled after being re-populated to generate the necessary access
log entries.

解決的辦法:

◆  Tomcat 7.0.x 用戶應該升級到 7.0.22 或者更新版本

◆ Tomcat 6.0.x 應該升級到 6.0.35 或更新版本

CVE-2012-0022 Apache Tomcat Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.22
◆ Tomcat 6.0.0 to 6.0.33
◆ Tomcat 5.5.0 to 5.5.34
◆ Earlier, unsupported versions may also be affected

Description:
Analysis of the recent hash collision vulnerability identified unrelated
inefficiencies with Apache Tomcat's handling of large numbers of
parameters and parameter values. These inefficiencies could allow an
attacker, via a specially crafted request, to cause large amounts of CPU
to be used which in turn could create a denial of service.
The issue was addressed by modifying the Tomcat parameter handling code
to efficiently process large numbers of parameters and parameter values.

Mitigation:

Users of affected versions should apply one of the following mitigations:

◆ Tomcat 7.0.x users should upgrade to 7.0.23 or later

◆ Tomcat 6.0.x users should upgrade to 6.0.35 or later

◆ Tomcat 5.5.x users should upgrade to 5.5.35 or later

以上就是Tomcat兩個重要漏洞的示例分析,小編相信有部分知識點可能是我們日常工作會見到或用到的。希望你能通過這篇文章學到更多知識。更多詳情敬請關注億速云行業資訊頻道。

向AI問一下細節

免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:is@yisu.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。

AI

林口县| 元朗区| 建阳市| 泰宁县| 湘潭市| 穆棱市| 江永县| 紫金县| 泸州市| 六安市| 施甸县| 绥滨县| 三亚市| 高唐县| 石首市| 玉门市| 宕昌县| 淮安市| 莱州市| 鲁甸县| 马公市| 体育| 盖州市| 玛多县| 尉犁县| 太和县| 桐城市| 依安县| 通州区| 万源市| 许昌县| 壶关县| 平果县| 富阳市| 亚东县| 宣汉县| 潮州市| 玛多县| 田林县| 沂水县| 镇安县|