Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Tomcat servlet engine MS/DOS device names denial of service


Vulnerability Assessment Details

Tomcat servlet engine MS/DOS device names denial of service

Vulnerability Assessment Summary
Kills Apache Tomcat by reading 1000+ times a MS/DOS device through the servlet engine

Detailed Explanation for this Vulnerability Assessment

It was possible to freeze or crash Windows or the web server
by reading a thousand of times a MS/DOS device through Tomcat
servlet engine, using a file name like /examples/servlet/AUX

A cracker may use this flaw to make your system crash
continuously, preventing you from working properly.

Solution : Upgrade your Apache Tomcat web server to version 4.1.10.
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

HP ProLiant MicroServer Turion II Neo N40L 1.5ghz / 8gb RAM w/RAC card
$51.0
HP ProLiant MicroServer Turion II Neo N40L 1.5ghz / 8gb RAM w/RAC card pictureNortel Networks Micro Annex XL AXM-D-8-S-173 Terminal Server
$39.99
Nortel Networks Micro Annex XL AXM-D-8-S-173 Terminal Server pictureSuper Micro Computer X7DWU LGA 771/Socket J Server Xeon Motherboard Refurb Unit
$41.98
Super Micro Computer X7DWU LGA 771/Socket J Server Xeon Motherboard Refurb Unit pictureHP ProLiant MicroServer N40L 1.5GHz 8GB 180GB-SSD boot 8TB-HDDs RAID-0/1/10
$268.52
HP ProLiant MicroServer N40L 1.5GHz 8GB 180GB-SSD boot 8TB-HDDs RAID-0/1/10 picture


Discussions

No Discussions have been posted on this vulnerability.