← Back to CVEs
CVE-2007-6286
N/ADescription
Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.
CVE Details
CVSS v3.1 ScoreN/A
Published2/12/2008
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
apache:tomcat
References
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=139344343412337&w=2(secalert@redhat.com)
http://secunia.com/advisories/28878(secalert@redhat.com)
http://secunia.com/advisories/28915(secalert@redhat.com)
http://secunia.com/advisories/29711(secalert@redhat.com)
http://secunia.com/advisories/30676(secalert@redhat.com)
http://secunia.com/advisories/32222(secalert@redhat.com)
http://secunia.com/advisories/37460(secalert@redhat.com)
http://secunia.com/advisories/57126(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200804-10.xml(secalert@redhat.com)
http://securityreason.com/securityalert/3637(secalert@redhat.com)
http://support.apple.com/kb/HT3216(secalert@redhat.com)
http://tomcat.apache.org/security-5.html(secalert@redhat.com)
http://tomcat.apache.org/security-6.html(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136(secalert@redhat.com)
http://www.securityfocus.com/archive/1/487823/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/507985/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/31681(secalert@redhat.com)
http://www.vmware.com/security/advisories/VMSA-2008-0010.html(secalert@redhat.com)
http://www.vmware.com/security/advisories/VMSA-2009-0016.html(secalert@redhat.com)
http://www.vupen.com/english/advisories/2008/0488(secalert@redhat.com)
http://www.vupen.com/english/advisories/2008/1856/references(secalert@redhat.com)
http://www.vupen.com/english/advisories/2008/2780(secalert@redhat.com)
http://www.vupen.com/english/advisories/2009/3316(secalert@redhat.com)
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E(secalert@redhat.com)
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E(secalert@redhat.com)
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E(secalert@redhat.com)
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html(secalert@redhat.com)
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=139344343412337&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28878(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28915(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29711(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30676(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/32222(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37460(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/57126(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200804-10.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/3637(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT3216(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-5.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-6.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/487823/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/507985/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/31681(af854a3a-2127-422b-91ae-364da2661108)
http://www.vmware.com/security/advisories/VMSA-2008-0010.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vmware.com/security/advisories/VMSA-2009-0016.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0488(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1856/references(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/2780(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/3316(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.