Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4590 (GCVE-0-2013-4590)
Vulnerability from cvelistv5 – Published: 2014-02-26 11:00 – Updated: 2024-08-06 16:45- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:45:15.235Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "MDVSA-2015:052",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "59724",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59724"
},
{
"name": "MDVSA-2015:084",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-8.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"name": "59722",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59722"
},
{
"name": "65768",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65768"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "59873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59873"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"name": "HPSBOV03503",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"name": "59036",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59036"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-02-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:10:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "MDVSA-2015:052",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "59724",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59724"
},
{
"name": "MDVSA-2015:084",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-8.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"name": "59722",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59722"
},
{
"name": "65768",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65768"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "59873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59873"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"name": "HPSBOV03503",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"name": "59036",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59036"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4590",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "MDVSA-2015:052",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "59724",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59724"
},
{
"name": "MDVSA-2015:084",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0148.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"name": "59722",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59722"
},
{
"name": "65768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65768"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "59873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59873"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"name": "HPSBOV03503",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"name": "59036",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59036"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4590",
"datePublished": "2014-02-26T11:00:00",
"dateReserved": "2013-06-12T00:00:00",
"dateUpdated": "2024-08-06T16:45:15.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4590\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-02-26T14:55:08.207\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \\\"Tomcat internals\\\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.\"},{\"lang\":\"es\",\"value\":\"Apache Tomcat anterior a 6.0.39, 7.x anterior a 7.0.50 y 8.x anterior a 8.0.0-RC10 permite a atacantes obtener informaci\u00f3n \\\"Tomcat internals\\\" mediante el aprovechamiento de la presencia de una aplicaci\u00f3n web no confiable con un documento context.xml, web.xml, *.jspx, *.tagx, o *.tld XML que contiene una declaraci\u00f3n de entidad externa en conjunto con una referencia de entidad, relacionada con un problema XML External Entity (XXE).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4752862B-7D26-4285-B8A0-CF082C758353\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4693BD36-E522-4C8E-9667-8F3E14A05EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F963D737-2E95-4D7C-92C7-DACF3F36D1E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AA5A5C3-EDA2-4D94-AECB-C68033B365FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBBC5EA-012C-4C5D-A61B-BAF134B300DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1A832F-C7B4-4877-A6B3-F5A8DF6E0804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"076317B8-63D9-4FF2-8F70-72081B4A8825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"059E3AB7-A3C7-448C-89ED-F1FD91180582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3612969F-B998-452E-A6E7-1D5D96DA9995\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.0.37\",\"matchCriteriaId\":\"A8CD8EF2-97B7-48F7-A91A-B8267BEFEC1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"981C90A2-B2EE-43E8-9885-4C9446770CF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFF8D91-80A2-454A-8B44-A5A889002692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC42876-65AD-476A-8B62-25D4E15D1BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724A8FF9-8089-4302-8200-08987A712988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F97DDB7-E32B-422F-8AEA-07C75DEAD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7079F63C-7CA8-4909-A9C8-45C4C1C1C186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C13A162-9F3A-41EB-BF4A-A54AD26F7F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE08AEE-4801-4FAF-97AD-BBD5C5849E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC829C8E-1061-4F62-BA4B-FE5C7F11F209\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"143BA75E-A186-47EF-A18C-B1A1A1F61C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CDF9E1-9412-450E-B1D4-438F128FFF9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32561F50-6385-4D71-AFAC-3D2F8DB55A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51D88E7-6F5C-42B0-BAD6-7DCD9A357B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C091BCC4-4B19-4304-A807-FE3BB3BCC8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C34D49-E1A2-47F0-8D85-25BB900A1844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"914E1404-01A2-4F94-AA40-D5EA20F55AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81FB1106-B26D-45BE-A511-8E69131BBA52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401A213A-FED3-49C0-B823-2E02EA528905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFE5AD8-DB14-4632-9D2A-F2013579CA7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7641278D-3B8B-4CD2-B284-2047B65514A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7B9911-E836-4A96-A0E8-D13C957EC0EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2341C51-A239-4A4A-B0DC-30F18175442C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E300013-0CE7-4313-A553-74A6A247B3E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D7414-8D0C-45D6-8E87-679DF0201D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CFD9CA-1878-4C74-A9BD-5D581736E6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7E52BE7-5281-4430-8846-E41CF34FC214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDA8066-294D-431E-B026-C03707DFBCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C92F3744-C8F9-4E29-BF1A-25E03A32F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9BD7E-FCC2-404B-A057-1A10997DAFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A79DA2C-35F3-47DE-909B-8D8D1AE111C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF6952D-6308-4029-8B63-0BD9C648C60F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17522878-4266-432A-859D-C02096C8AC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A28B11A-3BC7-41BC-8970-EE075B029F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CB39A6-8452-43F3-9DC4-8ADA8260FDE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D9B12F-F36A-424E-99BB-E00EF0FCA277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8FEEF0-8E57-43B1-8316-228B76E458D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82F3FAE-91AD-4F0B-A1F7-11C1A97C5ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B2802B-E56C-462A-9601-361A9166B5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190FB4FD-22A5-4771-8F99-1E260A36A474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD3785E-3A09-4BE4-96C7-619B8A7D5062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"285F7969-09F6-48CC-89CE-928225A53CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9EDACC-0300-4DA7-B1CD-5F7A6029AF38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B387EF0-94AD-4C8E-8CD4-4F5F706481BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA486065-18D5-4425-ADA5-284101919564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0141E20-2E3D-4CD0-A757-D7CA98499CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62493D-FEAE-49E8-A293-CE18451D0264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA01AB58-CAB2-420A-9899-EAB153DD898A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D731AFDD-9C33-4DC8-9BC6-06BB51048752\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01706205-1369-4E5D-8936-723DA980CA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC4A52C-6FBC-420A-885A-F72BC1DBAEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A1C882D-949B-40B9-BC9F-E7FCE4FE7C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1451D2-B905-4AD7-9BD7-10CF2A12BA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C505696B-10E4-4B99-A598-40FA0DA39F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB2F3D8-25A1-408E-80D0-59D52A901284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3904E9A-585A-4005-B2E9-13538535383D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1934BF-83E3-4B0B-A1DF-391A5332CE39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F06B9809-5BFA-4DB9-8753-1D8319713879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6631B0-9F2E-4C5F-AB21-F085A8C1559B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15625451-E56D-405F-BE9B-B3CB1A35E929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97ADBDC4-B669-467D-9A07-9A2DD8B68374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA876C8-4417-4C35-9FEC-278D45CE6E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C08A88-9377-4B32-8173-EE2D121B06D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7225A43-8EAE-4DA6-BBDC-4418D5444767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46C0933-3B19-40EA-8DED-2BF25AB85C17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34672E90-C220-436B-9143-480941227933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56581E2-9ECD-426A-96D8-A9D958900AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6995-5AF0-484C-90C0-A82F25FD2E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D70CFD9-B55D-4A29-B94C-D33F3E881A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1195878-CCC9-49BC-9AC7-1F88F0DFAB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375C26A9-623E-483A-BC11-468D9DE278C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCDDD480-3C9E-4BE9-848A-99A13145C2AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42BB8770-0BB4-4F23-AE24-58745095060D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B980C39-A4D8-483A-B48C-36CA4F5CEAA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF7178D-DC9B-45F7-BEA4-701B1EAEC2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BC5508-AA3A-4723-93A3-DBBFB4095BB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2757803-A75D-4B98-8473-8B5C53F4D2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83BA996F-C770-4E36-8FD8-916EA64E9A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A354C34-A3FE-4B8A-9985-8874A0634BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE300CC-FD4A-444E-8506-E5E269D0A0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50A3EC9-516E-48A7-839B-A73F491B5B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C28F09D-5CAA-4CA7-A2B5-3B2820F5F409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B93A3A-D487-4CA1-8257-26F8FE287B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8802B2-57E0-4AA6-BC8E-00DE60468569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461DF95-18DC-4BF5-A703-7F19DA88DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2823789C-2CB6-4300-94DB-BDBE83ABA8E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A61429EE-4331-430C-9830-58DCCBCBCB58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B3593F-CEDF-423C-90F8-F88EED87DC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7862B2-E1FA-4E16-92CD-8918AB461D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E03BE3-60CC-4415-B993-D0BB00F87A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E5E8C3-21AD-4230-B945-AB7DE66307B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4945C8C1-C71B-448B-9075-07C6C92599CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED4730B0-2E09-408B-AFD4-FE00F73700FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8C62EF-1B67-456A-9C66-755439CF8556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E9607B-4D28-460D-896B-E4B7FA22441E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A819E245-D641-4F19-9139-6C940504F6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C381275-10C5-4939-BCE3-0D1F3B3CB2EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A31CA0-A209-4C49-AA06-C38E165E5B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7205475A-6D04-4042-B24E-1DA5A57029B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08022987-B36B-4F63-88A5-A8F59195DF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA563BF-A67A-477D-956A-167ABEF885C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9731BAA-4C6C-4259-B786-F577D8A90FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74A421-D019-4248-84B8-C70D4D9A8A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05346F5A-FB52-4376-AAC7-9A5308216545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305688F2-50A6-41FB-8614-BC589DB9A789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24AA431-C436-4AA5-85DF-B9AAFF2548FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25966344-15D5-4101-9346-B06BFD2DFFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F4CBAC-27B1-4EFF-955A-A63B457D0578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD55B338-9DBE-4643-ABED-A08964D3AF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D4F710E-06EA-48F4-AC6A-6F143950F015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4936C2-0B2D-4C44-98C3-443090965F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48453405-2319-4327-9F4C-6F70B49452C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DD9544-6424-41A6-AEC0-EC19B8A10E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4670E65-2E11-49A4-B661-57C2F60D411F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E8FF71D-4710-4FBB-9925-A6A26C450F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31002A23-4788-4BC7-AE11-A3C2AA31716D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7144EDDF-8265-4642-8EEB-ED52527E0A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF06B5C1-B9DD-4673-A101-56E1E593ACDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D731065-626B-4425-8E49-F708DD457824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D850EA-E537-42C8-93B9-96E15CB26747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E037DA05-2BEF-4F64-B8BB-307247B6A05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAF1EB5-FB34-40FC-96ED-9D073890D8BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D395D95B-1F4A-420E-A0F6-609360AF7B69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD221BA-0AB6-4972-8AD9-5D37AC07762F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55B6565-96CB-4F6A-9A80-C3FB82F30546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3300AFE-49A4-4904-B9A0-5679F09FA01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5125CC-05F9-4678-90DB-A5C7CD24AE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD93669-1B30-4BF8-AD7D-F60DD8D63CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B904C74-B92E-4EAE-AE6C-78E2B844C3DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C8C97F-6C9D-4647-AB8A-ADAA5536DDE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C6109D1-BC36-40C5-A02A-7AEBC949BAC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA8A7333-B4C3-4876-AE01-62F2FD315504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92993E23-D805-407B-8B87-11CEEE8B212F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A11BD74-305C-41E2-95B1-5008EEF5FA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"595442D0-9DB7-475A-AE30-8535B70E122E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0BA92A-0BD3-4CE4-9465-95E949104BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F944B72-B9EB-4EB8-AEA3-E0D7ADBE1305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C947E549-2459-4AFB-84A7-36BDA30B5F29\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1C288F-326B-497B-B26C-D26E01262DDB\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0148.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://secunia.com/advisories/59036\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59722\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59724\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59873\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1549528\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1549529\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1558828\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-8.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21667883\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675886\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677147\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678231\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3530\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:052\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:084\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/65768\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1069911\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0148.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://secunia.com/advisories/59036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59722\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1549528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1549529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1558828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tomcat.apache.org/security-8.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21667883\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/65768\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1069911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2014:1087
Vulnerability from csaf_redhat - Published: 2014-08-21 15:29 - Updated: 2025-11-21 17:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.1.0, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.1,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.1.0\nRelease Notes, linked to in the References section, for information on the\nmost significant of these changes.\n\nThe following security issues are also fixed with this release:\n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nIt was found that several application-provided XML files, such as web.xml,\ncontent.xml, *.tld, *.tagx, and *.jspx, resolved external entities,\npermitting XML External Entity (XXE) attacks. An attacker able to deploy\nmalicious applications to Tomcat could use this flaw to circumvent security\nrestrictions set by the JSM, and gain access to sensitive information on\nthe system. Note that this flaw only affected deployments in which Tomcat\nis running applications from untrusted sources, such as in a shared hosting\nenvironment. (CVE-2013-4590)\n\nIt was found that, in certain circumstances, it was possible for a\nmalicious web application to replace the XML parsers used by Tomcat to\nprocess XSLTs for the default servlet, JSP documents, tag library\ndescriptors (TLDs), and tag plug-in configuration files. The injected XML\nparser(s) could then bypass the limits imposed on XML external entities\nand/or gain access to the XML files processed for other web applications\ndeployed on the same Tomcat instance. (CVE-2014-0119)\n\nAll users of Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 6\nare advised to upgrade to Red Hat JBoss Web Server 2.1.0. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1087",
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1087.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update",
"tracking": {
"current_release_date": "2025-11-21T17:49:42+00:00",
"generator": {
"date": "2025-11-21T17:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1087",
"initial_release_date": "2014-08-21T15:29:44+00:00",
"revision_history": [
{
"date": "2014-08-21T15:29:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-08-21T15:29:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-7.redhat_6.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-7.redhat_6.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-5.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"product": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"product_id": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/antlr-eap6@2.7.7-17.redhat_4.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"product_id": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-eap6@3.18.1-1.GA_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product": {
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product_id": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-tomcat-eap6@3.2.1-15.redhat_3.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product_id": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-15.redhat_3.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"product_id": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-logging@3.1.4-1.GA_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"product": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"product_id": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j-eap6@1.6.1-20.redhat_6.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"product": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"product_id": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-9.redhat_3.1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.9-1.Final_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.9-1.Final_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_id": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.9-1.Final_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"product": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"product_id": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc7@0.0.1-7.Alpha3_redhat_12.5.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-logging-tomcat-eap6@1.1.1-7.9_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-logging-eap6@1.1.1-7.9_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"product": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"product_id": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc6@0.0.1-7.Alpha3_redhat_12.3.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_id": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-6_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-5_patch_02.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-c3p0-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-infinispan-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product": {
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_id": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"product": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"product_id": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-transaction-api_1.1_spec@1.0.1-12.Final_redhat_2.2.ep6.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"product_id": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-7.redhat_6.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-5.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"product": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"product_id": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/antlr-eap6@2.7.7-17.redhat_4.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"product": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"product_id": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-eap6@3.18.1-1.GA_redhat_1.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"product": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"product_id": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-15.redhat_3.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"product": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"product_id": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-logging@3.1.4-1.GA_redhat_1.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"product": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"product_id": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j-eap6@1.6.1-20.redhat_6.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"product": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"product_id": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-9.redhat_3.1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"product": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"product_id": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.9-1.Final_redhat_1.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"product": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"product_id": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc7@0.0.1-7.Alpha3_redhat_12.5.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"product_id": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-logging-eap6@1.1.1-7.9_redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"product": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"product_id": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc6@0.0.1-7.Alpha3_redhat_12.3.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el6.src",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el6.src",
"product_id": "httpd-0:2.2.26-35.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"product": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"product_id": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.54-6_patch_02.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"product": {
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"product_id": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.41-5_patch_02.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"product": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"product_id": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"product": {
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"product_id": "mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.40-2.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"product": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"product_id": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-transaction-api_1.1_spec@1.0.1-12.Final_redhat_2.2.ep6.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"product_id": "mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.26-35.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"product_id": "httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.26-35.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"product_id": "httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.26-35.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"product_id": "httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-35.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"product_id": "httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.26-35.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el6.x86_64",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el6.x86_64",
"product_id": "httpd-0:2.2.26-35.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"product": {
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"product_id": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt-debuginfo@2.4.1-6.GA.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"product": {
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"product_id": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp-debuginfo@2.4.1-13.GA.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product_id": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.9-3.Final_redhat_2.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.30-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.40-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.40-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.40-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-6.redhat_2.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.2.26-35.ep6.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.26-35.ep6.el6.i386",
"product_id": "mod_ssl-1:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.26-35.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.26-35.ep6.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.26-35.ep6.el6.i386",
"product_id": "httpd-devel-0:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.26-35.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.26-35.ep6.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.26-35.ep6.el6.i386",
"product_id": "httpd-tools-0:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.26-35.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"product_id": "httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-35.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.26-35.ep6.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.26-35.ep6.el6.i386",
"product_id": "httpd-manual-0:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.26-35.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el6.i386",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el6.i386",
"product_id": "httpd-0:2.2.26-35.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"product": {
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"product_id": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt-debuginfo@2.4.1-6.GA.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"product": {
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"product_id": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp-debuginfo@2.4.1-13.GA.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product_id": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.9-3.Final_redhat_2.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.30-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.40-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.40-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.40-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-6.redhat_2.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el6?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch"
},
"product_reference": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src"
},
"product_reference": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch"
},
"product_reference": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src"
},
"product_reference": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch"
},
"product_reference": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch"
},
"product_reference": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src"
},
"product_reference": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch"
},
"product_reference": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src"
},
"product_reference": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src"
},
"product_reference": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src"
},
"product_reference": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src"
},
"product_reference": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch"
},
"product_reference": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src"
},
"product_reference": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src"
},
"product_reference": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src"
},
"product_reference": "mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386"
},
"product_reference": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64"
},
"product_reference": "mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386"
},
"product_reference": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64"
},
"product_reference": "mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.26-35.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.26-35.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.26-35.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch"
},
"product_reference": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src"
},
"product_reference": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch"
},
"product_reference": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src"
},
"product_reference": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src"
},
"product_reference": "tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src"
},
"product_reference": "tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4590",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2014-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1069911"
}
],
"notes": [
{
"category": "description",
"text": "It was found that several application-provided XML files, such as web.xml, content.xml, *.tld, *.tagx, and *.jspx, resolved external entities, permitting XML External Entity (XXE) attacks. An attacker able to deploy malicious applications to Tomcat could use this flaw to circumvent security restrictions set by the JSM, and gain access to sensitive information on the system. Note that this flaw only affected deployments in which Tomcat is running applications from untrusted sources, such as in a shared hosting environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information disclosure via XXE when running untrusted web applications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect JBoss Web, as shipped with various Red Hat JBoss products.\n\nThis issue does affect Tomcat 5 as shipped by Red Hat Enterprise Linux 5. The risks in breaking compatibility associated with fixing this flaw outweigh the benefits of the fix, therefore Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux 5. Additionally, note that Red Hat Enterprise Linux 5 is currently in reduced support phase, receiving only Critical security updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/site/support/policy/updates/errata#Production_3_Phase",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4590"
},
{
"category": "external",
"summary": "RHBZ#1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590"
}
],
"release_date": "2014-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: information disclosure via XXE when running untrusted web applications"
},
{
"cve": "CVE-2014-0118",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120601"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_deflate module handled request body decompression (configured via the \"DEFLATE\" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_deflate denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0118"
},
{
"category": "external",
"summary": "RHBZ#1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_deflate denial of service"
},
{
"cve": "CVE-2014-0119",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2014-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1102038"
}
],
"notes": [
{
"category": "description",
"text": "It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same JBoss Web / Apache Tomcat instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: XML parser hijack by malicious web application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0119"
},
{
"category": "external",
"summary": "RHBZ#1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119"
}
],
"release_date": "2014-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat/JBossWeb: XML parser hijack by malicious web application"
},
{
"cve": "CVE-2014-0226",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120603"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the \"apache\" user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_status heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0226"
},
{
"category": "external",
"summary": "RHBZ#1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_status heap-based buffer overflow"
},
{
"cve": "CVE-2014-0227",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1109196"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0227"
},
{
"category": "external",
"summary": "RHBZ#1109196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43",
"url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55",
"url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55"
}
],
"release_date": "2015-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter"
},
{
"cve": "CVE-2014-0231",
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120596"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_cgid denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0231"
},
{
"category": "external",
"summary": "RHBZ#1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1087"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.noarch",
"6Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-logging-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-logging-tomcat-eap6-0:1.1.1-7.9_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.noarch",
"6Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_rt-debuginfo-0:2.4.1-6.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.src",
"6Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.i386",
"6Server-JBEWS-2:mod_snmp-debuginfo-0:2.4.1-13.GA.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el6.x86_64",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el6.src",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.noarch",
"6Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.41-5_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-5_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_cgid denial of service"
}
]
}
RHSA-2014:1088
Vulnerability from csaf_redhat - Published: 2014-08-21 15:29 - Updated: 2025-11-21 17:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.1.0, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.1,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.1.0\nRelease Notes, linked to in the References section, for information on the\nmost significant of these changes.\n\nThe following security issues are also fixed with this release:\n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nIt was found that several application-provided XML files, such as web.xml,\ncontent.xml, *.tld, *.tagx, and *.jspx, resolved external entities,\npermitting XML External Entity (XXE) attacks. An attacker able to deploy\nmalicious applications to Tomcat could use this flaw to circumvent security\nrestrictions set by the JSM, and gain access to sensitive information on\nthe system. Note that this flaw only affected deployments in which Tomcat\nis running applications from untrusted sources, such as in a shared hosting\nenvironment. (CVE-2013-4590)\n\nIt was found that, in certain circumstances, it was possible for a\nmalicious web application to replace the XML parsers used by Tomcat to\nprocess XSLTs for the default servlet, JSP documents, tag library\ndescriptors (TLDs), and tag plug-in configuration files. The injected XML\nparser(s) could then bypass the limits imposed on XML external entities\nand/or gain access to the XML files processed for other web applications\ndeployed on the same Tomcat instance. (CVE-2014-0119)\n\nAll users of Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 5\nare advised to upgrade to Red Hat JBoss Web Server 2.1.0. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1088",
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1088.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update",
"tracking": {
"current_release_date": "2025-11-21T17:49:43+00:00",
"generator": {
"date": "2025-11-21T17:49:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1088",
"initial_release_date": "2014-08-21T15:29:13+00:00",
"revision_history": [
{
"date": "2014-08-21T15:29:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-08-21T15:29:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-7.redhat_6.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-7.redhat_6.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-5.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"product": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"product_id": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/antlr-eap6@2.7.7-17.redhat_4.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product": {
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product_id": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-tomcat-eap6@3.2.1-15.redhat_3.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product_id": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-15.redhat_3.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"product_id": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-eap6@3.18.1-1.GA_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"product_id": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-logging@3.1.4-1.GA_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"product": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"product_id": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j-eap6@1.6.1-20.redhat_6.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"product": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"product_id": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-9.redhat_3.1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.9-1.Final_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.9-1.Final_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_id": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.9-1.Final_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"product": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"product_id": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc7@0.0.1-7.Alpha3_redhat_12.5.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-6_patch_02.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-c3p0-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-infinispan-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product": {
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_id": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"product": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"product_id": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc6@0.0.1-7.Alpha3_redhat_12.3.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"product": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"product_id": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-transaction-api_1.1_spec@1.0.1-12.Final_redhat_2.2.ep6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"product_id": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-7.redhat_6.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-5.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"product": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"product_id": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/antlr-eap6@2.7.7-17.redhat_4.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"product": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"product_id": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-15.redhat_3.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"product": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"product_id": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-eap6@3.18.1-1.GA_redhat_1.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"product": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"product_id": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-logging@3.1.4-1.GA_redhat_1.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"product": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"product_id": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j-eap6@1.6.1-20.redhat_6.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"product": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"product_id": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-9.redhat_3.1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"product": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"product_id": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.9-1.Final_redhat_1.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"product": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"product_id": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc7@0.0.1-7.Alpha3_redhat_12.5.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el5.src",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el5.src",
"product_id": "httpd-0:2.2.26-35.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"product": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"product_id": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.54-6_patch_02.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"product": {
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"product_id": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.41-6_patch_02.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"product": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"product_id": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.14-3.SP1_redhat_1.1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"product": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"product_id": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/storeconfig-tc6@0.0.1-7.Alpha3_redhat_12.3.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"product": {
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"product_id": "mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.40-2.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"product": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"product_id": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-transaction-api_1.1_spec@1.0.1-12.Final_redhat_2.2.ep6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"product_id": "mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.26-35.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"product_id": "httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.26-35.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"product": {
"name": "httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"product_id": "httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.26-35.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"product_id": "httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.26-35.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el5.x86_64",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el5.x86_64",
"product_id": "httpd-0:2.2.26-35.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.40-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.40-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.2.26-35.ep6.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.26-35.ep6.el5.i386",
"product_id": "mod_ssl-1:2.2.26-35.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.26-35.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.26-35.ep6.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.26-35.ep6.el5.i386",
"product_id": "httpd-devel-0:2.2.26-35.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.26-35.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.26-35.ep6.el5.i386",
"product": {
"name": "httpd-tools-0:2.2.26-35.ep6.el5.i386",
"product_id": "httpd-tools-0:2.2.26-35.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.26-35.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.26-35.ep6.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.26-35.ep6.el5.i386",
"product_id": "httpd-manual-0:2.2.26-35.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.26-35.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.26-35.ep6.el5.i386",
"product": {
"name": "httpd-0:2.2.26-35.ep6.el5.i386",
"product_id": "httpd-0:2.2.26-35.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.26-35.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"product": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"product_id": "mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_rt@2.4.1-6.GA.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"product": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"product_id": "mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_snmp@2.4.1-13.GA.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"product": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"product_id": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.9-3.Final_redhat_2.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"product": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"product_id": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.30-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.40-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.40-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-6.redhat_2.ep6.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch"
},
"product_reference": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src"
},
"product_reference": "antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch"
},
"product_reference": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src"
},
"product_reference": "apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch"
},
"product_reference": "apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch"
},
"product_reference": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src"
},
"product_reference": "dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch"
},
"product_reference": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src"
},
"product_reference": "ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src"
},
"product_reference": "hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.26-35.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64"
},
"product_reference": "httpd-0:2.2.26-35.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.26-35.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.26-35.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.26-35.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.26-35.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.26-35.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.26-35.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.26-35.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386"
},
"product_reference": "httpd-tools-0:2.2.26-35.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.26-35.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64"
},
"product_reference": "httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src"
},
"product_reference": "javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src"
},
"product_reference": "jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch"
},
"product_reference": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src"
},
"product_reference": "jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src"
},
"product_reference": "mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src"
},
"product_reference": "mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64"
},
"product_reference": "mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64"
},
"product_reference": "mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.26-35.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.26-35.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.26-35.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch"
},
"product_reference": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src"
},
"product_reference": "storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch"
},
"product_reference": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src"
},
"product_reference": "storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src"
},
"product_reference": "tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src"
},
"product_reference": "tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4590",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2014-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1069911"
}
],
"notes": [
{
"category": "description",
"text": "It was found that several application-provided XML files, such as web.xml, content.xml, *.tld, *.tagx, and *.jspx, resolved external entities, permitting XML External Entity (XXE) attacks. An attacker able to deploy malicious applications to Tomcat could use this flaw to circumvent security restrictions set by the JSM, and gain access to sensitive information on the system. Note that this flaw only affected deployments in which Tomcat is running applications from untrusted sources, such as in a shared hosting environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information disclosure via XXE when running untrusted web applications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect JBoss Web, as shipped with various Red Hat JBoss products.\n\nThis issue does affect Tomcat 5 as shipped by Red Hat Enterprise Linux 5. The risks in breaking compatibility associated with fixing this flaw outweigh the benefits of the fix, therefore Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux 5. Additionally, note that Red Hat Enterprise Linux 5 is currently in reduced support phase, receiving only Critical security updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/site/support/policy/updates/errata#Production_3_Phase",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4590"
},
{
"category": "external",
"summary": "RHBZ#1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590"
}
],
"release_date": "2014-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: information disclosure via XXE when running untrusted web applications"
},
{
"cve": "CVE-2014-0118",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120601"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_deflate module handled request body decompression (configured via the \"DEFLATE\" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_deflate denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0118"
},
{
"category": "external",
"summary": "RHBZ#1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_deflate denial of service"
},
{
"cve": "CVE-2014-0119",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2014-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1102038"
}
],
"notes": [
{
"category": "description",
"text": "It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same JBoss Web / Apache Tomcat instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: XML parser hijack by malicious web application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0119"
},
{
"category": "external",
"summary": "RHBZ#1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119"
}
],
"release_date": "2014-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat/JBossWeb: XML parser hijack by malicious web application"
},
{
"cve": "CVE-2014-0226",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120603"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the \"apache\" user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_status heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0226"
},
{
"category": "external",
"summary": "RHBZ#1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_status heap-based buffer overflow"
},
{
"cve": "CVE-2014-0227",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1109196"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0227"
},
{
"category": "external",
"summary": "RHBZ#1109196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43",
"url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55",
"url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55"
}
],
"release_date": "2015-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter"
},
{
"cve": "CVE-2014-0231",
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120596"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_cgid denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0231"
},
{
"category": "external",
"summary": "RHBZ#1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:29:13+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1088"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.noarch",
"5Server-JBEWS-2:antlr-eap6-0:2.7.7-17.redhat_4.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-collections-tomcat-eap6-0:3.2.1-15.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-5.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-7.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-7.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-eap6-0:1.6.1-20.redhat_6.1.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-9.redhat_3.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-c3p0-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-core-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:hibernate4-entitymanager-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-envers-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:hibernate4-infinispan-eap6-0:4.2.14-3.SP1_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:javassist-eap6-0:3.18.1-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.noarch",
"5Server-JBEWS-2:jboss-transaction-api_1.1_spec-0:1.0.1-12.Final_redhat_2.2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.9-1.Final_redhat_1.1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.40-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.40-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_rt-0:2.4.1-6.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.i386",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.src",
"5Server-JBEWS-2:mod_snmp-0:2.4.1-13.GA.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.26-35.ep6.el5.x86_64",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc6-0:0.0.1-7.Alpha3_redhat_12.3.ep6.el5.src",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.noarch",
"5Server-JBEWS-2:storeconfig-tc7-0:0.0.1-7.Alpha3_redhat_12.5.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.30-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.41-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.41-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.54-6_patch_02.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-6_patch_02.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.54-6_patch_02.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_cgid denial of service"
}
]
}
RHSA-2014:1038
Vulnerability from csaf_redhat - Published: 2014-08-11 16:44 - Updated: 2025-11-21 17:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat6 packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was found that several application-provided XML files, such as web.xml,\ncontent.xml, *.tld, *.tagx, and *.jspx, resolved external entities,\npermitting XML External Entity (XXE) attacks. An attacker able to deploy\nmalicious applications to Tomcat could use this flaw to circumvent security\nrestrictions set by the JSM, and gain access to sensitive information on\nthe system. Note that this flaw only affected deployments in which Tomcat\nis running applications from untrusted sources, such as in a shared hosting\nenvironment. (CVE-2013-4590)\n\nIt was found that, in certain circumstances, it was possible for a\nmalicious web application to replace the XML parsers used by Apache Tomcat\nto process XSLTs for the default servlet, JSP documents, tag library\ndescriptors (TLDs), and tag plug-in configuration files. The injected XML\nparser(s) could then bypass the limits imposed on XML external entities\nand/or gain access to the XML files processed for other web applications\ndeployed on the same Apache Tomcat instance. (CVE-2014-0119)\n\nAll Tomcat users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. Tomcat must be\nrestarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1038",
"url": "https://access.redhat.com/errata/RHSA-2014:1038"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-6.html",
"url": "https://tomcat.apache.org/security-6.html"
},
{
"category": "external",
"summary": "1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1038.json"
}
],
"title": "Red Hat Security Advisory: tomcat6 security update",
"tracking": {
"current_release_date": "2025-11-21T17:49:33+00:00",
"generator": {
"date": "2025-11-21T17:49:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1038",
"initial_release_date": "2014-08-11T16:44:40+00:00",
"revision_history": [
{
"date": "2014-08-11T16:44:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-08-11T16:44:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.24-78.el6_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-78.el6_5.noarch",
"product": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch",
"product_id": "tomcat6-0:6.0.24-78.el6_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-78.el6_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat6-0:6.0.24-78.el6_5.src",
"product": {
"name": "tomcat6-0:6.0.24-78.el6_5.src",
"product_id": "tomcat6-0:6.0.24-78.el6_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.24-78.el6_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.24-78.el6_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src"
},
"product_reference": "tomcat6-0:6.0.24-78.el6_5.src",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4590",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2014-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1069911"
}
],
"notes": [
{
"category": "description",
"text": "It was found that several application-provided XML files, such as web.xml, content.xml, *.tld, *.tagx, and *.jspx, resolved external entities, permitting XML External Entity (XXE) attacks. An attacker able to deploy malicious applications to Tomcat could use this flaw to circumvent security restrictions set by the JSM, and gain access to sensitive information on the system. Note that this flaw only affected deployments in which Tomcat is running applications from untrusted sources, such as in a shared hosting environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information disclosure via XXE when running untrusted web applications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect JBoss Web, as shipped with various Red Hat JBoss products.\n\nThis issue does affect Tomcat 5 as shipped by Red Hat Enterprise Linux 5. The risks in breaking compatibility associated with fixing this flaw outweigh the benefits of the fix, therefore Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux 5. Additionally, note that Red Hat Enterprise Linux 5 is currently in reduced support phase, receiving only Critical security updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/site/support/policy/updates/errata#Production_3_Phase",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4590"
},
{
"category": "external",
"summary": "RHBZ#1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590"
}
],
"release_date": "2014-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-11T16:44:40+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1038"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: information disclosure via XXE when running untrusted web applications"
},
{
"cve": "CVE-2014-0119",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2014-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1102038"
}
],
"notes": [
{
"category": "description",
"text": "It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same JBoss Web / Apache Tomcat instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: XML parser hijack by malicious web application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0119"
},
{
"category": "external",
"summary": "RHBZ#1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119"
}
],
"release_date": "2014-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-11T16:44:40+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1038"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Client-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Client-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6ComputeNode-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6ComputeNode-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Server-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Server-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-0:6.0.24-78.el6_5.src",
"6Workstation-optional-6.5.z:tomcat6-admin-webapps-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-docs-webapp-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-el-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-javadoc-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-jsp-2.1-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-lib-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-servlet-2.5-api-0:6.0.24-78.el6_5.noarch",
"6Workstation-optional-6.5.z:tomcat6-webapps-0:6.0.24-78.el6_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat/JBossWeb: XML parser hijack by malicious web application"
}
]
}
RHSA-2014:1086
Vulnerability from csaf_redhat - Published: 2014-08-21 15:30 - Updated: 2025-11-21 17:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.1.0, which fixes multiple security issues and\nseveral bugs, is now available from the Red Hat Customer Portal for Red Hat\nEnterprise Linux 5 and 6, Solaris, and Microsoft Windows.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.1,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.1.0\nRelease Notes, linked to in the References section, for information on the\nmost significant of these changes.\n\nThe following security issues are also fixed with this release:\n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nNote: This update provides a fix for the CVE-2014-0221 issue in openssl\npackages for Solaris and Microsoft Windows.\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nIt was found that several application-provided XML files, such as web.xml,\ncontent.xml, *.tld, *.tagx, and *.jspx, resolved external entities,\npermitting XML External Entity (XXE) attacks. An attacker able to deploy\nmalicious applications to Tomcat could use this flaw to circumvent security\nrestrictions set by the JSM, and gain access to sensitive information on\nthe system. Note that this flaw only affected deployments in which Tomcat\nis running applications from untrusted sources, such as in a shared hosting\nenvironment. (CVE-2013-4590)\n\nIt was found that, in certain circumstances, it was possible for a\nmalicious web application to replace the XML parsers used by Tomcat to\nprocess XSLTs for the default servlet, JSP documents, tag library\ndescriptors (TLDs), and tag plug-in configuration files. The injected XML\nparser(s) could then bypass the limits imposed on XML external entities\nand/or gain access to the XML files processed for other web applications\ndeployed on the same Tomcat instance. (CVE-2014-0119)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original\nreporter of this issue.\n\nAll users of Red Hat JBoss Web Server 2.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Web Server 2.1.0.\nThe JBoss server process must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1086",
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.1.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.1.0"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Web_Server/2.1/html/2.1.0_Release_Notes/index.html"
},
{
"category": "external",
"summary": "1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "1103593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593"
},
{
"category": "external",
"summary": "1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1086.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update",
"tracking": {
"current_release_date": "2025-11-21T17:49:42+00:00",
"generator": {
"date": "2025-11-21T17:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1086",
"initial_release_date": "2014-08-21T15:30:27+00:00",
"revision_history": [
{
"date": "2014-08-21T15:30:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-08-21T15:30:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 2.1",
"product": {
"name": "Red Hat JBoss Web Server 2.1",
"product_id": "Red Hat JBoss Web Server 2.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4590",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2014-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1069911"
}
],
"notes": [
{
"category": "description",
"text": "It was found that several application-provided XML files, such as web.xml, content.xml, *.tld, *.tagx, and *.jspx, resolved external entities, permitting XML External Entity (XXE) attacks. An attacker able to deploy malicious applications to Tomcat could use this flaw to circumvent security restrictions set by the JSM, and gain access to sensitive information on the system. Note that this flaw only affected deployments in which Tomcat is running applications from untrusted sources, such as in a shared hosting environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: information disclosure via XXE when running untrusted web applications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect JBoss Web, as shipped with various Red Hat JBoss products.\n\nThis issue does affect Tomcat 5 as shipped by Red Hat Enterprise Linux 5. The risks in breaking compatibility associated with fixing this flaw outweigh the benefits of the fix, therefore Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux 5. Additionally, note that Red Hat Enterprise Linux 5 is currently in reduced support phase, receiving only Critical security updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/site/support/policy/updates/errata#Production_3_Phase",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4590"
},
{
"category": "external",
"summary": "RHBZ#1069911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590"
}
],
"release_date": "2014-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: information disclosure via XXE when running untrusted web applications"
},
{
"cve": "CVE-2014-0118",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120601"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_deflate module handled request body decompression (configured via the \"DEFLATE\" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_deflate denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0118"
},
{
"category": "external",
"summary": "RHBZ#1120601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_deflate denial of service"
},
{
"cve": "CVE-2014-0119",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2014-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1102038"
}
],
"notes": [
{
"category": "description",
"text": "It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by JBoss Web / Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same JBoss Web / Apache Tomcat instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: XML parser hijack by malicious web application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0119"
},
{
"category": "external",
"summary": "RHBZ#1102038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0119"
}
],
"release_date": "2014-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Tomcat/JBossWeb: XML parser hijack by malicious web application"
},
{
"acknowledgments": [
{
"names": [
"OpenSSL project"
]
},
{
"names": [
"Imre Rad"
],
"organization": "Search-Lab",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2014-0221",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1103593"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: DoS when sending invalid DTLS handshake",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0221"
},
{
"category": "external",
"summary": "RHBZ#1103593",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0221",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv_20140605.txt",
"url": "https://www.openssl.org/news/secadv_20140605.txt"
}
],
"release_date": "2014-06-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: DoS when sending invalid DTLS handshake"
},
{
"cve": "CVE-2014-0226",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120603"
}
],
"notes": [
{
"category": "description",
"text": "A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the \"apache\" user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_status heap-based buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0226"
},
{
"category": "external",
"summary": "RHBZ#1120603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_status heap-based buffer overflow"
},
{
"cve": "CVE-2014-0227",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2014-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1109196"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0227"
},
{
"category": "external",
"summary": "RHBZ#1109196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0227"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43",
"url": "https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43"
},
{
"category": "external",
"summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55",
"url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55"
}
],
"release_date": "2015-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter"
},
{
"cve": "CVE-2014-0231",
"discovery_date": "2014-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1120596"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in the way httpd\u0027s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_cgid denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-0231"
},
{
"category": "external",
"summary": "RHBZ#1120596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2014-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-08-21T15:30:27+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1086"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_cgid denial of service"
}
]
}
CERTFR-2022-AVI-568
Vulnerability from certfr_avis - Published: 2022-06-17 - Updated: 2022-06-17
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5 sans le correctif de sécurité 7.5.0-QRADAR-PROTOCOL-ApacheKafka-7.5-20220429171113 | ||
| IBM | N/A | IBM Disconnected Log Collector versions 1.x antérieures à 1.7.3 | ||
| IBM | N/A | IBM Customer and Network Analytics for Communications Service Providers and Datasets (CNA) versions 10.0.0.x antérieures à 10.0.0.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4 sans le correctif de sécurité 7.4.0-QRADAR-PROTOCOL-ApacheKafka-7.4-20220429171217 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3 sans le correctif de sécurité 7.3.0-QRADAR-PROTOCOL-ApacheKafka-7.3-20220429171209 | ||
| IBM | N/A | IBM Rational Test Control Panel component in Rational Test Workbench toutes versions sans le correctif de sécurité Rational-RTCP-<product-name>-<product-version>-CVE-2022-22965-ifix | ||
| IBM | N/A | IBM Analytic Accelerator Framework for Communication Service Providers (AAF) versions 4.0.0.x antérieures à 4.0.0.2 | ||
| IBM | N/A | IBM Rational Test Control Panel component in Rational Test Virtualization Server toutes versions sans le correctif de sécurité Rational-RTCP-<product-name>-<product-version>-CVE-2022-22965-ifix |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.5 sans le correctif de s\u00e9curit\u00e9 7.5.0-QRADAR-PROTOCOL-ApacheKafka-7.5-20220429171113",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Disconnected Log Collector versions 1.x ant\u00e9rieures \u00e0 1.7.3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Customer and Network Analytics for Communications Service Providers and Datasets (CNA) versions 10.0.0.x ant\u00e9rieures \u00e0 10.0.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.4 sans le correctif de s\u00e9curit\u00e9 7.4.0-QRADAR-PROTOCOL-ApacheKafka-7.4-20220429171217",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3 sans le correctif de s\u00e9curit\u00e9 7.3.0-QRADAR-PROTOCOL-ApacheKafka-7.3-20220429171209",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Test Control Panel component in Rational Test Workbench toutes versions sans le correctif de s\u00e9curit\u00e9 Rational-RTCP-\u003cproduct-name\u003e-\u003cproduct-version\u003e-CVE-2022-22965-ifix",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Analytic Accelerator Framework for Communication Service Providers (AAF) versions 4.0.0.x ant\u00e9rieures \u00e0 4.0.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Rational Test Control Panel component in Rational Test Virtualization Server toutes versions sans le correctif de s\u00e9curit\u00e9 Rational-RTCP-\u003cproduct-name\u003e-\u003cproduct-version\u003e-CVE-2022-22965-ifix",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12384"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2014-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2012-5886",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5886"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2016-6797",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6797"
},
{
"name": "CVE-2016-8735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8735"
},
{
"name": "CVE-2020-8022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8022"
},
{
"name": "CVE-2013-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4286"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2012-5885",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5885"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"name": "CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2019-17195",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17195"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2016-0706",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0706"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2016-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0714"
},
{
"name": "CVE-2012-4431",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4431"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2014-0230",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0230"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2014-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
},
{
"name": "CVE-2013-2185",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2185"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2016-6794",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6794"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2015-5174",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5174"
},
{
"name": "CVE-2021-27568",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27568"
},
{
"name": "CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2016-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6816"
},
{
"name": "CVE-2018-17196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17196"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2012-3546",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3546"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2016-5018",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5018"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2019-12814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12814"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2013-4322",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2012-4534",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4534"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2014-7810",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7810"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2016-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0762"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2014-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2013-4444",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4444"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2012-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5887"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2017-5647",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5647"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2015-5345",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5345"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2016-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5388"
},
{
"name": "CVE-2014-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
},
{
"name": "CVE-2012-2733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2733"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-6796",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6796"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2022-06-17T00:00:00",
"last_revision_date": "2022-06-17T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-568",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 les produits IBM 6595755 du 16 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6595755"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 les produits IBM 6595739 du 16 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6595739"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 les produits IBM 6595965 du 16 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6595965"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 les produits IBM 6595721 du 16 juin 2022",
"url": "https://www.ibm.com/support/pages/node/6595721"
}
]
}
CERTFR-2014-AVI-244
Vulnerability from certfr_avis - Published: 2014-05-27 - Updated: 2014-05-27
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Solaris 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4286"
},
{
"name": "CVE-2013-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0200"
},
{
"name": "CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"name": "CVE-2013-6712",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6712"
},
{
"name": "CVE-2013-6420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6420"
},
{
"name": "CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"name": "CVE-2012-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4037"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2010-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0205"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2013-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4248"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2014-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1943"
},
{
"name": "CVE-2014-2281",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2281"
},
{
"name": "CVE-2013-4496",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4496"
},
{
"name": "CVE-2013-4322",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
},
{
"name": "CVE-2013-5211",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5211"
},
{
"name": "CVE-2014-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2014-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2283"
},
{
"name": "CVE-2013-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6438"
},
{
"name": "CVE-2014-2270",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2270"
},
{
"name": "CVE-2013-4238",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4238"
},
{
"name": "CVE-2014-1912",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1912"
},
{
"name": "CVE-2014-2282",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2282"
}
],
"initial_release_date": "2014-05-27T00:00:00",
"last_revision_date": "2014-05-27T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-244",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-05-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 22 mai 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTFR-2014-AVI-382
Vulnerability from certfr_avis - Published: 2014-09-11 - Updated: 2014-09-11
De multiples vulnérabilités ont été corrigées dans VMware vSphere. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware vCenter Server 5.5 inf\u00e9rieure \u00e0 Update 2",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 5.5 sans le correctif ESXi550-201409101-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Update Manager 5.5 inf\u00e9rieure \u00e0 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1914"
},
{
"name": "CVE-2014-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0050"
},
{
"name": "CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"name": "CVE-2014-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
},
{
"name": "CVE-2013-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0242"
},
{
"name": "CVE-2013-4322",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
}
],
"initial_release_date": "2014-09-11T00:00:00",
"last_revision_date": "2014-09-11T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2014-0008 du 09 septembre 2014",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
}
],
"reference": "CERTFR-2014-AVI-382",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eVMware vSphere\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware vSphere",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2014-0008 du 09 septembre 2014",
"url": null
}
]
}
CERTFR-2014-AVI-357
Vulnerability from certfr_avis - Published: 2014-08-14 - Updated: 2014-08-14
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NSM3000 | ||
| ESET | Security | Security Threat Response Manager | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics | ||
| N/A | N/A | NSMExpress |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NSM3000",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Security Threat Response Manager",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "NSMExpress",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0053"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2013-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4286"
},
{
"name": "CVE-2013-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4002"
},
{
"name": "CVE-2013-5823",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
},
{
"name": "CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"name": "CVE-2012-5081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2013-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
},
{
"name": "CVE-2013-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
},
{
"name": "CVE-2012-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0031"
},
{
"name": "CVE-2014-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
},
{
"name": "CVE-2014-0067",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0067"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2013-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2461"
},
{
"name": "CVE-2013-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2013-5802",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2013-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2013-4322",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
},
{
"name": "CVE-2013-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2013-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
},
{
"name": "CVE-2014-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0107"
},
{
"name": "CVE-2013-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
},
{
"name": "CVE-2014-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-2010-5298",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5298"
},
{
"name": "CVE-2013-5825",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
},
{
"name": "CVE-2013-1537",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
},
{
"name": "CVE-2014-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0198"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2013-5830",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
}
],
"initial_release_date": "2014-08-14T00:00:00",
"last_revision_date": "2014-08-14T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-357",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10642 du 13 ao\u00fbt 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10642"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10643 du 13 ao\u00fbt 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10643"
}
]
}
GSD-2013-4590
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-4590",
"description": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GSD-2013-4590",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4590.html",
"https://www.debian.org/security/2016/dsa-3530",
"https://access.redhat.com/errata/RHSA-2014:1088",
"https://access.redhat.com/errata/RHSA-2014:1087",
"https://access.redhat.com/errata/RHSA-2014:1086",
"https://access.redhat.com/errata/RHSA-2014:1038",
"https://advisories.mageia.org/CVE-2013-4590.html",
"https://linux.oracle.com/cve/CVE-2013-4590.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-4590"
],
"details": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GSD-2013-4590",
"modified": "2023-12-13T01:22:16.491982Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4590",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "MDVSA-2015:052",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "59724",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59724"
},
{
"name": "MDVSA-2015:084",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0148.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"name": "59722",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59722"
},
{
"name": "65768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65768"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "59873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59873"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"name": "HPSBOV03503",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"name": "59036",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59036"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,6.0.39),[7.0.0,7.0.50),[8.0.0-RC1,8.0.0-RC9]",
"affected_versions": "All versions before 6.0.39, all versions starting from 7.0.0 before 7.0.50, all versions starting from 8.0.0-rc1 up to 8.0.0-rc9",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2022-07-07",
"description": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"fixed_versions": [
"6.0.39",
"7.0.50",
"8.0.0-RC10"
],
"identifier": "CVE-2013-4590",
"identifiers": [
"GHSA-87w9-x2c3-hrjj",
"CVE-2013-4590"
],
"not_impacted": "All versions starting from 6.0.39 before 7.0.0, all versions starting from 7.0.50 before 8.0.0-rc1, all versions after 8.0.0-rc9",
"package_slug": "maven/org.apache.tomcat/tomcat",
"pubdate": "2022-05-14",
"solution": "Upgrade to versions 6.0.39, 7.0.50, 8.0.0-RC10 or above.",
"title": "Exposure of Sensitive Information to an Unauthorized Actor",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2013-4590",
"https://bugzilla.redhat.com/show_bug.cgi?id=1069911",
"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E",
"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E",
"http://advisories.mageia.org/MGASA-2014-0148.html",
"http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2",
"http://svn.apache.org/viewvc?view=revision\u0026revision=1549528",
"http://svn.apache.org/viewvc?view=revision\u0026revision=1549529",
"http://svn.apache.org/viewvc?view=revision\u0026revision=1558828",
"http://tomcat.apache.org/security-6.html",
"http://tomcat.apache.org/security-7.html",
"http://tomcat.apache.org/security-8.html",
"http://www-01.ibm.com/support/docview.wss?uid=swg21667883",
"http://www-01.ibm.com/support/docview.wss?uid=swg21675886",
"http://www-01.ibm.com/support/docview.wss?uid=swg21677147",
"http://www-01.ibm.com/support/docview.wss?uid=swg21678231",
"http://www.debian.org/security/2016/dsa-3530",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"https://github.com/advisories/GHSA-87w9-x2c3-hrjj"
],
"uuid": "9a9d42f0-c0d8-46db-b76c-5e7086ab5a33"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.37",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4590"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"name": "59873",
"refsource": "SECUNIA",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59873"
},
{
"name": "59036",
"refsource": "SECUNIA",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59036"
},
{
"name": "59722",
"refsource": "SECUNIA",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59722"
},
{
"name": "65768",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65768"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"name": "59724",
"refsource": "SECUNIA",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59724"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"name": "MDVSA-2015:052",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0148.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"name": "MDVSA-2015:084",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "HPSBOV03503",
"refsource": "HP",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
"refsource": "CONFIRM",
"tags": [],
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2019-04-15T16:29Z",
"publishedDate": "2014-02-26T14:55Z"
}
}
}
FKIE_CVE-2013-4590
Vulnerability from fkie_nvd - Published: 2014-02-26 14:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://advisories.mageia.org/MGASA-2014-0148.html | Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=144498216801440&w=2 | Mailing List | |
| secalert@redhat.com | http://secunia.com/advisories/59036 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/59722 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/59724 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/59873 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1549528 | Issue Tracking | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1549529 | Issue Tracking | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1558828 | Issue Tracking | |
| secalert@redhat.com | http://tomcat.apache.org/security-6.html | Vendor Advisory | |
| secalert@redhat.com | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| secalert@redhat.com | http://tomcat.apache.org/security-8.html | Vendor Advisory | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21667883 | Third Party Advisory | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21675886 | Third Party Advisory | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21677147 | Third Party Advisory | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21678231 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2016/dsa-3530 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:052 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 | Third Party Advisory | |
| secalert@redhat.com | http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html | Third Party Advisory | |
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/65768 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2014-0008.html | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1069911 | Issue Tracking | |
| secalert@redhat.com | https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2014-0148.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=144498216801440&w=2 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59036 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59722 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59724 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59873 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1549528 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1549529 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1558828 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-6.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-8.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21667883 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21675886 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21677147 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21678231 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3530 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:052 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/65768 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0008.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1069911 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| apache | tomcat | 8.0.0 | |
| debian | debian_linux | 7.0 | |
| apache | tomcat | * | |
| apache | tomcat | 1.1.3 | |
| apache | tomcat | 3.0 | |
| apache | tomcat | 3.1 | |
| apache | tomcat | 3.1.1 | |
| apache | tomcat | 3.2 | |
| apache | tomcat | 3.2.1 | |
| apache | tomcat | 3.2.2 | |
| apache | tomcat | 3.2.2 | |
| apache | tomcat | 3.2.3 | |
| apache | tomcat | 3.2.4 | |
| apache | tomcat | 3.3 | |
| apache | tomcat | 3.3.1 | |
| apache | tomcat | 3.3.1a | |
| apache | tomcat | 3.3.2 | |
| apache | tomcat | 4 | |
| apache | tomcat | 4.0.0 | |
| apache | tomcat | 4.0.1 | |
| apache | tomcat | 4.0.2 | |
| apache | tomcat | 4.0.3 | |
| apache | tomcat | 4.0.4 | |
| apache | tomcat | 4.0.5 | |
| apache | tomcat | 4.0.6 | |
| apache | tomcat | 4.1.0 | |
| apache | tomcat | 4.1.1 | |
| apache | tomcat | 4.1.2 | |
| apache | tomcat | 4.1.3 | |
| apache | tomcat | 4.1.3 | |
| apache | tomcat | 4.1.9 | |
| apache | tomcat | 4.1.10 | |
| apache | tomcat | 4.1.12 | |
| apache | tomcat | 4.1.15 | |
| apache | tomcat | 4.1.24 | |
| apache | tomcat | 4.1.28 | |
| apache | tomcat | 4.1.29 | |
| apache | tomcat | 4.1.31 | |
| apache | tomcat | 4.1.36 | |
| apache | tomcat | 5 | |
| apache | tomcat | 5.0.0 | |
| apache | tomcat | 5.0.1 | |
| apache | tomcat | 5.0.2 | |
| apache | tomcat | 5.0.3 | |
| apache | tomcat | 5.0.4 | |
| apache | tomcat | 5.0.5 | |
| apache | tomcat | 5.0.6 | |
| apache | tomcat | 5.0.7 | |
| apache | tomcat | 5.0.8 | |
| apache | tomcat | 5.0.9 | |
| apache | tomcat | 5.0.10 | |
| apache | tomcat | 5.0.11 | |
| apache | tomcat | 5.0.12 | |
| apache | tomcat | 5.0.13 | |
| apache | tomcat | 5.0.14 | |
| apache | tomcat | 5.0.15 | |
| apache | tomcat | 5.0.16 | |
| apache | tomcat | 5.0.17 | |
| apache | tomcat | 5.0.18 | |
| apache | tomcat | 5.0.19 | |
| apache | tomcat | 5.0.21 | |
| apache | tomcat | 5.0.22 | |
| apache | tomcat | 5.0.23 | |
| apache | tomcat | 5.0.24 | |
| apache | tomcat | 5.0.25 | |
| apache | tomcat | 5.0.26 | |
| apache | tomcat | 5.0.27 | |
| apache | tomcat | 5.0.28 | |
| apache | tomcat | 5.0.29 | |
| apache | tomcat | 5.0.30 | |
| apache | tomcat | 5.5.0 | |
| apache | tomcat | 5.5.1 | |
| apache | tomcat | 5.5.2 | |
| apache | tomcat | 5.5.3 | |
| apache | tomcat | 5.5.4 | |
| apache | tomcat | 5.5.5 | |
| apache | tomcat | 5.5.6 | |
| apache | tomcat | 5.5.7 | |
| apache | tomcat | 5.5.8 | |
| apache | tomcat | 5.5.9 | |
| apache | tomcat | 5.5.10 | |
| apache | tomcat | 5.5.11 | |
| apache | tomcat | 5.5.12 | |
| apache | tomcat | 5.5.13 | |
| apache | tomcat | 5.5.14 | |
| apache | tomcat | 5.5.15 | |
| apache | tomcat | 5.5.16 | |
| apache | tomcat | 5.5.17 | |
| apache | tomcat | 5.5.18 | |
| apache | tomcat | 5.5.19 | |
| apache | tomcat | 5.5.20 | |
| apache | tomcat | 5.5.21 | |
| apache | tomcat | 5.5.22 | |
| apache | tomcat | 5.5.23 | |
| apache | tomcat | 5.5.24 | |
| apache | tomcat | 5.5.25 | |
| apache | tomcat | 5.5.26 | |
| apache | tomcat | 5.5.27 | |
| apache | tomcat | 5.5.28 | |
| apache | tomcat | 5.5.29 | |
| apache | tomcat | 5.5.30 | |
| apache | tomcat | 5.5.31 | |
| apache | tomcat | 5.5.32 | |
| apache | tomcat | 5.5.33 | |
| apache | tomcat | 5.5.34 | |
| apache | tomcat | 5.5.35 | |
| apache | tomcat | 6 | |
| apache | tomcat | 6.0 | |
| apache | tomcat | 6.0.0 | |
| apache | tomcat | 6.0.0 | |
| apache | tomcat | 6.0.1 | |
| apache | tomcat | 6.0.1 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.3 | |
| apache | tomcat | 6.0.10 | |
| apache | tomcat | 6.0.11 | |
| apache | tomcat | 6.0.12 | |
| apache | tomcat | 6.0.13 | |
| apache | tomcat | 6.0.14 | |
| apache | tomcat | 6.0.15 | |
| apache | tomcat | 6.0.16 | |
| apache | tomcat | 6.0.17 | |
| apache | tomcat | 6.0.18 | |
| apache | tomcat | 6.0.19 | |
| apache | tomcat | 6.0.20 | |
| apache | tomcat | 6.0.24 | |
| apache | tomcat | 6.0.26 | |
| apache | tomcat | 6.0.27 | |
| apache | tomcat | 6.0.28 | |
| apache | tomcat | 6.0.29 | |
| apache | tomcat | 6.0.30 | |
| apache | tomcat | 6.0.31 | |
| apache | tomcat | 6.0.32 | |
| apache | tomcat | 6.0.33 | |
| apache | tomcat | 6.0.35 | |
| apache | tomcat | 6.0.36 | |
| apache | tomcat | 7.0.0 | |
| apache | tomcat | 7.0.0 | |
| apache | tomcat | 7.0.1 | |
| apache | tomcat | 7.0.2 | |
| apache | tomcat | 7.0.2 | |
| apache | tomcat | 7.0.3 | |
| apache | tomcat | 7.0.4 | |
| apache | tomcat | 7.0.4 | |
| apache | tomcat | 7.0.10 | |
| apache | tomcat | 7.0.11 | |
| apache | tomcat | 7.0.12 | |
| apache | tomcat | 7.0.13 | |
| apache | tomcat | 7.0.14 | |
| apache | tomcat | 7.0.15 | |
| apache | tomcat | 7.0.16 | |
| apache | tomcat | 7.0.17 | |
| apache | tomcat | 7.0.18 | |
| apache | tomcat | 7.0.19 | |
| apache | tomcat | 7.0.20 | |
| apache | tomcat | 7.0.21 | |
| apache | tomcat | 7.0.22 | |
| apache | tomcat | 7.0.23 | |
| apache | tomcat | 7.0.24 | |
| apache | tomcat | 7.0.25 | |
| apache | tomcat | 7.0.26 | |
| apache | tomcat | 7.0.27 | |
| apache | tomcat | 7.0.28 | |
| apache | tomcat | 7.0.29 | |
| apache | tomcat | 7.0.30 | |
| apache | tomcat | 7.0.31 | |
| apache | tomcat | 7.0.32 | |
| apache | tomcat | 7.0.33 | |
| apache | tomcat | 7.0.34 | |
| apache | tomcat | 7.0.35 | |
| apache | tomcat | 7.0.36 | |
| apache | tomcat | 7.0.37 | |
| apache | tomcat | 7.0.38 | |
| apache | tomcat | 7.0.39 | |
| apache | tomcat | 7.0.40 | |
| apache | tomcat | 7.0.41 | |
| apache | tomcat | 7.0.42 | |
| apache | tomcat | 7.0.43 | |
| apache | tomcat | 7.0.44 | |
| apache | tomcat | 7.0.45 | |
| apache | tomcat | 7.0.46 | |
| apache | tomcat | 7.0.50 | |
| oracle | solaris | 11.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4752862B-7D26-4285-B8A0-CF082C758353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4693BD36-E522-4C8E-9667-8F3E14A05EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F963D737-2E95-4D7C-92C7-DACF3F36D1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3AA5A5C3-EDA2-4D94-AECB-C68033B365FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "2BBBC5EA-012C-4C5D-A61B-BAF134B300DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "7B1A832F-C7B4-4877-A6B3-F5A8DF6E0804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "076317B8-63D9-4FF2-8F70-72081B4A8825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:*",
"matchCriteriaId": "059E3AB7-A3C7-448C-89ED-F1FD91180582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:*",
"matchCriteriaId": "3612969F-B998-452E-A6E7-1D5D96DA9995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CD8EF2-97B7-48F7-A91A-B8267BEFEC1E",
"versionEndIncluding": "6.0.37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "981C90A2-B2EE-43E8-9885-4C9446770CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFF8D91-80A2-454A-8B44-A5A889002692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC42876-65AD-476A-8B62-25D4E15D1BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "724A8FF9-8089-4302-8200-08987A712988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F97DDB7-E32B-422F-8AEA-07C75DEAD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7079F63C-7CA8-4909-A9C8-45C4C1C1C186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2C13A162-9F3A-41EB-BF4A-A54AD26F7F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*",
"matchCriteriaId": "4BE08AEE-4801-4FAF-97AD-BBD5C5849E3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EC829C8E-1061-4F62-BA4B-FE5C7F11F209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "143BA75E-A186-47EF-A18C-B1A1A1F61C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CDF9E1-9412-450E-B1D4-438F128FFF9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32561F50-6385-4D71-AFAC-3D2F8DB55A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D51D88E7-6F5C-42B0-BAD6-7DCD9A357B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C091BCC4-4B19-4304-A807-FE3BB3BCC8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*",
"matchCriteriaId": "91C34D49-E1A2-47F0-8D85-25BB900A1844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "914E1404-01A2-4F94-AA40-D5EA20F55AD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81FB1106-B26D-45BE-A511-8E69131BBA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "401A213A-FED3-49C0-B823-2E02EA528905",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFE5AD8-DB14-4632-9D2A-F2013579CA7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7641278D-3B8B-4CD2-B284-2047B65514A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7B9911-E836-4A96-A0E8-D13C957EC0EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D2341C51-A239-4A4A-B0DC-30F18175442C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E300013-0CE7-4313-A553-74A6A247B3E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E08D7414-8D0C-45D6-8E87-679DF0201D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60CFD9CA-1878-4C74-A9BD-5D581736E6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E52BE7-5281-4430-8846-E41CF34FC214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "CBDA8066-294D-431E-B026-C03707DFBCD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C92F3744-C8F9-4E29-BF1A-25E03A32F2C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D9BD7E-FCC2-404B-A057-1A10997DAFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "6A79DA2C-35F3-47DE-909B-8D8D1AE111C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF6952D-6308-4029-8B63-0BD9C648C60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "17522878-4266-432A-859D-C02096C8AC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "5A28B11A-3BC7-41BC-8970-EE075B029F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5:*:*:*:*:*:*:*",
"matchCriteriaId": "28CB39A6-8452-43F3-9DC4-8ADA8260FDE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13D9B12F-F36A-424E-99BB-E00EF0FCA277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8FEEF0-8E57-43B1-8316-228B76E458D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D82F3FAE-91AD-4F0B-A1F7-11C1A97C5ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B2802B-E56C-462A-9601-361A9166B5F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "190FB4FD-22A5-4771-8F99-1E260A36A474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD3785E-3A09-4BE4-96C7-619B8A7D5062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "285F7969-09F6-48CC-89CE-928225A53CDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B9EDACC-0300-4DA7-B1CD-5F7A6029AF38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6B387EF0-94AD-4C8E-8CD4-4F5F706481BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DA486065-18D5-4425-ADA5-284101919564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A0141E20-2E3D-4CD0-A757-D7CA98499CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62493D-FEAE-49E8-A293-CE18451D0264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FA01AB58-CAB2-420A-9899-EAB153DD898A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D731AFDD-9C33-4DC8-9BC6-06BB51048752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "01706205-1369-4E5D-8936-723DA980CA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC4A52C-6FBC-420A-885A-F72BC1DBAEC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1C882D-949B-40B9-BC9F-E7FCE4FE7C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1451D2-B905-4AD7-9BD7-10CF2A12BA34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C505696B-10E4-4B99-A598-40FA0DA39F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB2F3D8-25A1-408E-80D0-59D52A901284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C3904E9A-585A-4005-B2E9-13538535383D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1934BF-83E3-4B0B-A1DF-391A5332CE39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F06B9809-5BFA-4DB9-8753-1D8319713879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6631B0-9F2E-4C5F-AB21-F085A8C1559B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "15625451-E56D-405F-BE9B-B3CB1A35E929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADBDC4-B669-467D-9A07-9A2DD8B68374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA876C8-4417-4C35-9FEC-278D45CE6E92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "03C08A88-9377-4B32-8173-EE2D121B06D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "F7225A43-8EAE-4DA6-BBDC-4418D5444767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A46C0933-3B19-40EA-8DED-2BF25AB85C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98B82A-22E5-4E6C-90AE-56F5780EA147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34672E90-C220-436B-9143-480941227933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92883AFA-A02F-41A5-9977-ABEAC8AD2970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "989A78F8-EE92-465F-8A8D-ECF0B58AFE7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFB09F3-32D1-479C-8C39-D7329D9A6623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D56581E2-9ECD-426A-96D8-A9D958900AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717F6995-5AF0-484C-90C0-A82F25FD2E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F67477AB-85F6-421C-9C0B-C8EFB1B200CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5D70CFD9-B55D-4A29-B94C-D33F3E881A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "C1195878-CCC9-49BC-9AC7-1F88F0DFAB82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "375C26A9-623E-483A-BC11-468D9DE278C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDDD480-3C9E-4BE9-848A-99A13145C2AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "42BB8770-0BB4-4F23-AE24-58745095060D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7B980C39-A4D8-483A-B48C-36CA4F5CEAA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF7178D-DC9B-45F7-BEA4-701B1EAEC2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*",
"matchCriteriaId": "82BC5508-AA3A-4723-93A3-DBBFB4095BB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "A2757803-A75D-4B98-8473-8B5C53F4D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6:*:*:*:*:*:*:*",
"matchCriteriaId": "83BA996F-C770-4E36-8FD8-916EA64E9A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "0A354C34-A3FE-4B8A-9985-8874A0634BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "CFE300CC-FD4A-444E-8506-E5E269D0A0A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"matchCriteriaId": "F50A3EC9-516E-48A7-839B-A73F491B5B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "8C28F09D-5CAA-4CA7-A2B5-3B2820F5F409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B93A3A-D487-4CA1-8257-26F8FE287B8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8802B2-57E0-4AA6-BC8E-00DE60468569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8461DF95-18DC-4BF5-A703-7F19DA88DC30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "2823789C-2CB6-4300-94DB-BDBE83ABA8E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "C5416C76-46ED-4CB1-A7F8-F24EA16DE7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "A61429EE-4331-430C-9830-58DCCBCBCB58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "31B3593F-CEDF-423C-90F8-F88EED87DC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7862B2-E1FA-4E16-92CD-8918AB461D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E03BE3-60CC-4415-B993-D0BB00F87A30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "48E5E8C3-21AD-4230-B945-AB7DE66307B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "4945C8C1-C71B-448B-9075-07C6C92599CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4730B0-2E09-408B-AFD4-FE00F73700FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "81A31CA0-A209-4C49-AA06-C38E165E5B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "0AA563BF-A67A-477D-956A-167ABEF885C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A9731BAA-4C6C-4259-B786-F577D8A90FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1F74A421-D019-4248-84B8-C70D4D9A8A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "05346F5A-FB52-4376-AAC7-9A5308216545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "305688F2-50A6-41FB-8614-BC589DB9A789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "D24AA431-C436-4AA5-85DF-B9AAFF2548FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "25966344-15D5-4101-9346-B06BFD2DFFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11F4CBAC-27B1-4EFF-955A-A63B457D0578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "FD55B338-9DBE-4643-ABED-A08964D3AF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4F710E-06EA-48F4-AC6A-6F143950F015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4936C2-0B2D-4C44-98C3-443090965F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "48453405-2319-4327-9F4C-6F70B49452C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "49DD9544-6424-41A6-AEC0-EC19B8A10E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E4670E65-2E11-49A4-B661-57C2F60D411F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8FF71D-4710-4FBB-9925-A6A26C450F7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "31002A23-4788-4BC7-AE11-A3C2AA31716D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "7144EDDF-8265-4642-8EEB-ED52527E0A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "DF06B5C1-B9DD-4673-A101-56E1E593ACDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7D731065-626B-4425-8E49-F708DD457824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D850EA-E537-42C8-93B9-96E15CB26747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E037DA05-2BEF-4F64-B8BB-307247B6A05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAF1EB5-FB34-40FC-96ED-9D073890D8BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D395D95B-1F4A-420E-A0F6-609360AF7B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD221BA-0AB6-4972-8AD9-5D37AC07762F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "E55B6565-96CB-4F6A-9A80-C3FB82F30546",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "D3300AFE-49A4-4904-B9A0-5679F09FA01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5125CC-05F9-4678-90DB-A5C7CD24AE6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD93669-1B30-4BF8-AD7D-F60DD8D63CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "1B904C74-B92E-4EAE-AE6C-78E2B844C3DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C8C97F-6C9D-4647-AB8A-ADAA5536DDE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6109D1-BC36-40C5-A02A-7AEBC949BAC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8A7333-B4C3-4876-AE01-62F2FD315504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "92993E23-D805-407B-8B87-11CEEE8B212F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "7A11BD74-305C-41E2-95B1-5008EEF5FA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "595442D0-9DB7-475A-AE30-8535B70E122E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0BA92A-0BD3-4CE4-9465-95E949104BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "6F944B72-B9EB-4EB8-AEA3-E0D7ADBE1305",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "C947E549-2459-4AFB-84A7-36BDA30B5F29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue."
},
{
"lang": "es",
"value": "Apache Tomcat anterior a 6.0.39, 7.x anterior a 7.0.50 y 8.x anterior a 8.0.0-RC10 permite a atacantes obtener informaci\u00f3n \"Tomcat internals\" mediante el aprovechamiento de la presencia de una aplicaci\u00f3n web no confiable con un documento context.xml, web.xml, *.jspx, *.tagx, o *.tld XML que contiene una declaraci\u00f3n de entidad externa en conjunto con una referencia de entidad, relacionada con un problema XML External Entity (XXE)."
}
],
"id": "CVE-2013-4590",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-02-26T14:55:08.207",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59036"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59722"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59724"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59873"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-8.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65768"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"source": "secalert@redhat.com",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59036"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59722"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-8.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65768"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-87W9-X2C3-HRJJ
Vulnerability from github – Published: 2022-05-14 01:10 – Updated: 2024-02-22 16:17Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, .jspx, .tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.39"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.50"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 8.0.0-RC9"
},
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "8.0.0-RC1"
},
{
"fixed": "8.0.0-RC10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-4590"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-07T23:28:09Z",
"nvd_published_at": "2014-02-26T14:55:00Z",
"severity": "MODERATE"
},
"details": "Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain \"Tomcat internals\" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
"id": "GHSA-87w9-x2c3-hrjj",
"modified": "2024-02-22T16:17:29Z",
"published": "2022-05-14T01:10:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4590"
},
{
"type": "WEB",
"url": "https://github.com/apache/tomcat/commit/05c84ff8304a69a30b251f207a7b93c2c882564d"
},
{
"type": "WEB",
"url": "https://github.com/apache/tomcat/commit/78dd7e6f3d8481bc3bcd71ca5b20296de1283888"
},
{
"type": "WEB",
"url": "https://github.com/apache/tomcat/commit/b9e06ead01984483af73f48e7861bc7897f5e84f"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069911"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/tomcat"
},
{
"type": "WEB",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "http://advisories.mageia.org/MGASA-2014-0148.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=144498216801440\u0026w=2"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549528"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1549529"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1558828"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667883"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.