Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Tomcat servlet engine MS/DOS device names denial of service


Vulnerability Assessment Details

Tomcat servlet engine MS/DOS device names denial of service

Vulnerability Assessment Summary
Kills Apache Tomcat by reading 1000+ times a MS/DOS device through the servlet engine

Detailed Explanation for this Vulnerability Assessment

It was possible to freeze or crash Windows or the web server
by reading a thousand of times a MS/DOS device through Tomcat
servlet engine, using a file name like /examples/servlet/AUX

A cracker may use this flaw to make your system crash
continuously, preventing you from working properly.

Solution : Upgrade your Apache Tomcat web server to version 4.1.10.
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 64GB 6x 450GB 15K SAS PERC H700
$1063.0
Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 64GB 6x 450GB 15K SAS PERC H700 pictureDell PowerEdge R710 2x X5550 2.66GHz Quad Core 48GB 6x 300GB 15K SAS PERC 6/i
$644.0
Dell PowerEdge R710 2x X5550 2.66GHz Quad Core 48GB 6x 300GB 15K SAS PERC 6/i pictureEconomy DELL PowerEdge R620 Server 2x 2.00Ghz E5-2620 6C 64GB 2x 146GB 15K SAS
$1204.5
Economy DELL PowerEdge R620 Server 2x 2.00Ghz E5-2620 6C 64GB 2x 146GB 15K SAS pictureDELL POWEREDGE R730XD SERVER 12 BAY E5-2609V4 1.7GHZ 64GB 12 X 500GB SATA H730
$4729.0
DELL POWEREDGE R730XD SERVER 12 BAY E5-2609V4 1.7GHZ 64GB 12 X 500GB SATA H730 picture


Discussions

No Discussions have been posted on this vulnerability.