CVE-2012-4534 : Detail

CVE-2012-4534

12.76%V3
Network
2012-12-19
10h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.6 AV:N/AC:H/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Apache>>Tomcat >> Version 6.0

Apache>>Tomcat >> Version 6.0.0

Apache>>Tomcat >> Version 6.0.0

Apache>>Tomcat >> Version 6.0.1

Apache>>Tomcat >> Version 6.0.1

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.3

Apache>>Tomcat >> Version 6.0.4

Apache>>Tomcat >> Version 6.0.4

Apache>>Tomcat >> Version 6.0.5

Apache>>Tomcat >> Version 6.0.6

Apache>>Tomcat >> Version 6.0.6

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.8

Apache>>Tomcat >> Version 6.0.8

Apache>>Tomcat >> Version 6.0.9

Apache>>Tomcat >> Version 6.0.9

Apache>>Tomcat >> Version 6.0.10

Apache>>Tomcat >> Version 6.0.11

Apache>>Tomcat >> Version 6.0.12

Apache>>Tomcat >> Version 6.0.13

Apache>>Tomcat >> Version 6.0.14

Apache>>Tomcat >> Version 6.0.15

Apache>>Tomcat >> Version 6.0.16

Apache>>Tomcat >> Version 6.0.17

Apache>>Tomcat >> Version 6.0.18

Apache>>Tomcat >> Version 6.0.19

Apache>>Tomcat >> Version 6.0.20

Apache>>Tomcat >> Version 6.0.24

Apache>>Tomcat >> Version 6.0.26

Apache>>Tomcat >> Version 6.0.27

Apache>>Tomcat >> Version 6.0.28

Apache>>Tomcat >> Version 6.0.29

Apache>>Tomcat >> Version 6.0.30

Apache>>Tomcat >> Version 6.0.31

Apache>>Tomcat >> Version 6.0.32

Apache>>Tomcat >> Version 6.0.33

Apache>>Tomcat >> Version 6.0.35

Configuraton 0

Apache>>Tomcat >> Version 7.0.0

Apache>>Tomcat >> Version 7.0.0

Apache>>Tomcat >> Version 7.0.1

Apache>>Tomcat >> Version 7.0.2

Apache>>Tomcat >> Version 7.0.2

Apache>>Tomcat >> Version 7.0.3

Apache>>Tomcat >> Version 7.0.4

Apache>>Tomcat >> Version 7.0.4

Apache>>Tomcat >> Version 7.0.5

Apache>>Tomcat >> Version 7.0.6

Apache>>Tomcat >> Version 7.0.7

Apache>>Tomcat >> Version 7.0.8

Apache>>Tomcat >> Version 7.0.9

Apache>>Tomcat >> Version 7.0.10

Apache>>Tomcat >> Version 7.0.11

Apache>>Tomcat >> Version 7.0.12

Apache>>Tomcat >> Version 7.0.13

Apache>>Tomcat >> Version 7.0.14

Apache>>Tomcat >> Version 7.0.15

Apache>>Tomcat >> Version 7.0.16

Apache>>Tomcat >> Version 7.0.17

Apache>>Tomcat >> Version 7.0.18

Apache>>Tomcat >> Version 7.0.19

Apache>>Tomcat >> Version 7.0.20

Apache>>Tomcat >> Version 7.0.21

Apache>>Tomcat >> Version 7.0.22

Apache>>Tomcat >> Version 7.0.23

Apache>>Tomcat >> Version 7.0.25

References

http://marc.info/?l=bugtraq&m=136612293908376&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.ubuntu.com/usn/USN-1685-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.securitytracker.com/id?1027836
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/57126
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2013-0623.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/56813
Tags : vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=136612293908376&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Tags : vendor-advisory, x_refsource_HP