NA
CVSSv3

CVE-2005-3510

CVSSv4: NA | CVSSv3: NA | CVSSv2: 5 | VMScore: 600 | EPSS: 0.20508 | KEV: Not Included
Published: 06/11/2005 Updated: 03/04/2025

Vulnerability Summary

Apache Tomcat 5.5.0 to 5.5.11 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 5.5.0

apache tomcat 5.5.1

apache tomcat 5.5.2

apache tomcat 5.5.3

apache tomcat 5.5.4

apache tomcat 5.5.5

apache tomcat 5.5.6

apache tomcat 5.5.7

apache tomcat 5.5.8

apache tomcat 5.5.9

apache tomcat 5.5.10

apache tomcat 5.5.11

References

NVD-CWE-Otherhttps://nvd.nist.govhttps://www.first.org/epsshttp://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspxhttp://secunia.com/advisories/17416http://secunia.com/advisories/30899http://secunia.com/advisories/30908http://secunia.com/advisories/33668http://securitytracker.com/id?1015147http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540http://tomcat.apache.org/security-4.htmlhttp://tomcat.apache.org/security-5.htmlhttp://www.osvdb.org/20439http://www.redhat.com/support/errata/RHSA-2006-0161.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://www.securityfocus.com/archive/1/415782/30/0/threadedhttp://www.securityfocus.com/archive/1/500396/100/0/threadedhttp://www.securityfocus.com/archive/1/500412/100/0/threadedhttp://www.securityfocus.com/bid/15325http://www.vupen.com/english/advisories/2008/1979/referenceshttp://www.vupen.com/english/advisories/2009/0233https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3Ehttp://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspxhttp://secunia.com/advisories/17416http://secunia.com/advisories/30899http://secunia.com/advisories/30908http://secunia.com/advisories/33668http://securitytracker.com/id?1015147http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540http://tomcat.apache.org/security-4.htmlhttp://tomcat.apache.org/security-5.htmlhttp://www.osvdb.org/20439http://www.redhat.com/support/errata/RHSA-2006-0161.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://www.securityfocus.com/archive/1/415782/30/0/threadedhttp://www.securityfocus.com/archive/1/500396/100/0/threadedhttp://www.securityfocus.com/archive/1/500412/100/0/threadedhttp://www.securityfocus.com/bid/15325http://www.vupen.com/english/advisories/2008/1979/referenceshttp://www.vupen.com/english/advisories/2009/0233https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E