CVE-2011-2526

NameCVE-2011-2526
DescriptionApache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2401-1
NVD severitymedium (attack range: local)
Debian Bugs634992

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat6 (PTS)wheezy6.0.35-6+deb7u1fixed
wheezy (security)6.0.45+dfsg-1~deb7u1fixed
jessie6.0.41-3fixed
jessie (security)6.0.45+dfsg-1~deb8u1fixed
stretch, sid6.0.45+dfsg-1fixed
tomcat7 (PTS)wheezy7.0.28-4+deb7u3fixed
wheezy (security)7.0.28-4+deb7u4fixed
jessie7.0.56-3+deb8u1fixed
jessie (security)7.0.56-3+deb8u2fixed
stretch, sid7.0.69-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat5.5source(unstable)(unfixed)medium634992
tomcat6source(unstable)6.0.32-7medium634992
tomcat6sourcesqueeze6.0.35-1+squeeze2mediumDSA-2401-1
tomcat7source(unstable)7.0.19-1medium634992

Search for package or bug name: Reporting problems