CVE Vulnerabilities

CVE-2012-4534

Published: Dec 19, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
2.6 LOW
AV:N/AC:H/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.

Affected Software

NameVendorStart VersionEnd Version
TomcatApache6.0 (including)6.0 (including)
TomcatApache6.0.0 (including)6.0.0 (including)
TomcatApache6.0.0-alpha (including)6.0.0-alpha (including)
TomcatApache6.0.1 (including)6.0.1 (including)
TomcatApache6.0.1-alpha (including)6.0.1-alpha (including)
TomcatApache6.0.2 (including)6.0.2 (including)
TomcatApache6.0.2-alpha (including)6.0.2-alpha (including)
TomcatApache6.0.2-beta (including)6.0.2-beta (including)
TomcatApache6.0.3 (including)6.0.3 (including)
TomcatApache6.0.4 (including)6.0.4 (including)
TomcatApache6.0.4-alpha (including)6.0.4-alpha (including)
TomcatApache6.0.5 (including)6.0.5 (including)
TomcatApache6.0.6 (including)6.0.6 (including)
TomcatApache6.0.6-alpha (including)6.0.6-alpha (including)
TomcatApache6.0.7 (including)6.0.7 (including)
TomcatApache6.0.7-alpha (including)6.0.7-alpha (including)
TomcatApache6.0.7-beta (including)6.0.7-beta (including)
TomcatApache6.0.8 (including)6.0.8 (including)
TomcatApache6.0.8-alpha (including)6.0.8-alpha (including)
TomcatApache6.0.9 (including)6.0.9 (including)
TomcatApache6.0.9-beta (including)6.0.9-beta (including)
TomcatApache6.0.10 (including)6.0.10 (including)
TomcatApache6.0.11 (including)6.0.11 (including)
TomcatApache6.0.12 (including)6.0.12 (including)
TomcatApache6.0.13 (including)6.0.13 (including)
TomcatApache6.0.14 (including)6.0.14 (including)
TomcatApache6.0.15 (including)6.0.15 (including)
TomcatApache6.0.16 (including)6.0.16 (including)
TomcatApache6.0.17 (including)6.0.17 (including)
TomcatApache6.0.18 (including)6.0.18 (including)
TomcatApache6.0.19 (including)6.0.19 (including)
TomcatApache6.0.20 (including)6.0.20 (including)
TomcatApache6.0.24 (including)6.0.24 (including)
TomcatApache6.0.26 (including)6.0.26 (including)
TomcatApache6.0.27 (including)6.0.27 (including)
TomcatApache6.0.28 (including)6.0.28 (including)
TomcatApache6.0.29 (including)6.0.29 (including)
TomcatApache6.0.30 (including)6.0.30 (including)
TomcatApache6.0.31 (including)6.0.31 (including)
TomcatApache6.0.32 (including)6.0.32 (including)
TomcatApache6.0.33 (including)6.0.33 (including)
TomcatApache6.0.35 (including)6.0.35 (including)
Red Hat Enterprise Linux 6RedHattomcat6-0:6.0.24-52.el6_4*
Red Hat JBoss Enterprise Web Server 2 for RHEL 5RedHattomcat6-0:6.0.35-6_patch_06.ep6.el5*
Red Hat JBoss Enterprise Web Server 2 for RHEL 6RedHattomcat6-0:6.0.35-29_patch_06.ep6.el6*
Red Hat JBoss Web Server 2.0RedHat*
Tomcat6Ubuntulucid*
Tomcat6Ubuntuoneiric*
Tomcat6Ubuntuprecise*
Tomcat6Ubuntuquantal*
Tomcat6Ubuntuupstream*
Tomcat7Ubuntuoneiric*
Tomcat7Ubuntuprecise*
Tomcat7Ubuntuupstream*

References