Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T09:28:41.943Z
Reserved: 2008-07-24T00:00:00
Link: CVE-2008-3271

No data.

Status : Modified
Published: 2008-10-13T20:00:02.057
Modified: 2024-11-21T00:48:51.353
Link: CVE-2008-3271
