Apache Information for VU#204710

Apache Tomcat fails to properly handle certain requests



Vendor Statement

The Apache Software Foundation acknowledge that Tomcat 3.x can be remotely caused to crash or shutdown by a connection sending the right sequence of bytes to the AP12 protcol port (TCP 8007 by default). Tomcat 3.x users are advised to ensure that this port is adequately firewalled to ensure that it is not accessible to remote attackers. We do not plan on issuing updates to Tomcat 3.x for this issue.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.