Upstream information

CVE-2005-2090 at MITRE


Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entries: 352839 [RESOLVED / FIXED], 358544 [RESOLVED / FIXED], 865740 [NEEDINFO]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 SDK for x86
Novell Linux Desktop 9 SDK for x86_64
  • jakarta-tomcat >= 5.0.19-29.11
YOU Patch Nr: 12078
Open Enterprise Server
  • apache-jakarta-tomcat-connectors >= 5.0.19-29.11
  • apache2-jakarta-tomcat-connectors >= 5.0.19-29.11
  • jakarta-tomcat >= 5.0.19-29.11
  • jakarta-tomcat-doc >= 5.0.19-29.11
  • jakarta-tomcat-examples >= 5.0.19-29.11
YOU Patch Nr: 12078
  • mod_jk-ap20 >= 4.1.30-0.2
  • tomcat5 >= 5.0.30-27.21
  • tomcat5-admin-webapps >= 5.0.30-27.21
  • tomcat5-webapps >= 5.0.30-27.21