Vulnerability Details CVE-2009-0033
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.324
EPSS Ranking 96.6%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2009-0033
-
cpe:2.3:a:apache:tomcat:4.1.0
-
cpe:2.3:a:apache:tomcat:4.1.1
-
cpe:2.3:a:apache:tomcat:4.1.10
-
cpe:2.3:a:apache:tomcat:4.1.11
-
cpe:2.3:a:apache:tomcat:4.1.12
-
cpe:2.3:a:apache:tomcat:4.1.13
-
cpe:2.3:a:apache:tomcat:4.1.14
-
cpe:2.3:a:apache:tomcat:4.1.15
-
cpe:2.3:a:apache:tomcat:4.1.16
-
cpe:2.3:a:apache:tomcat:4.1.17
-
cpe:2.3:a:apache:tomcat:4.1.18
-
cpe:2.3:a:apache:tomcat:4.1.19
-
cpe:2.3:a:apache:tomcat:4.1.2
-
cpe:2.3:a:apache:tomcat:4.1.20
-
cpe:2.3:a:apache:tomcat:4.1.21
-
cpe:2.3:a:apache:tomcat:4.1.22
-
cpe:2.3:a:apache:tomcat:4.1.23
-
cpe:2.3:a:apache:tomcat:4.1.24
-
cpe:2.3:a:apache:tomcat:4.1.25
-
cpe:2.3:a:apache:tomcat:4.1.26
-
cpe:2.3:a:apache:tomcat:4.1.27
-
cpe:2.3:a:apache:tomcat:4.1.28
-
cpe:2.3:a:apache:tomcat:4.1.29
-
cpe:2.3:a:apache:tomcat:4.1.3
-
cpe:2.3:a:apache:tomcat:4.1.30
-
cpe:2.3:a:apache:tomcat:4.1.31
-
cpe:2.3:a:apache:tomcat:4.1.32
-
cpe:2.3:a:apache:tomcat:4.1.33
-
cpe:2.3:a:apache:tomcat:4.1.34
-
cpe:2.3:a:apache:tomcat:4.1.35
-
cpe:2.3:a:apache:tomcat:4.1.36
-
cpe:2.3:a:apache:tomcat:4.1.37
-
cpe:2.3:a:apache:tomcat:4.1.38
-
cpe:2.3:a:apache:tomcat:4.1.39
-
cpe:2.3:a:apache:tomcat:4.1.4
-
cpe:2.3:a:apache:tomcat:4.1.5
-
cpe:2.3:a:apache:tomcat:4.1.6
-
cpe:2.3:a:apache:tomcat:4.1.7
-
cpe:2.3:a:apache:tomcat:4.1.8
-
cpe:2.3:a:apache:tomcat:4.1.9
-
cpe:2.3:a:apache:tomcat:5.5.0
-
cpe:2.3:a:apache:tomcat:5.5.1
-
cpe:2.3:a:apache:tomcat:5.5.10
-
cpe:2.3:a:apache:tomcat:5.5.11
-
cpe:2.3:a:apache:tomcat:5.5.12
-
cpe:2.3:a:apache:tomcat:5.5.13
-
cpe:2.3:a:apache:tomcat:5.5.14
-
cpe:2.3:a:apache:tomcat:5.5.15
-
cpe:2.3:a:apache:tomcat:5.5.16
-
cpe:2.3:a:apache:tomcat:5.5.17
-
cpe:2.3:a:apache:tomcat:5.5.18
-
cpe:2.3:a:apache:tomcat:5.5.19
-
cpe:2.3:a:apache:tomcat:5.5.2
-
cpe:2.3:a:apache:tomcat:5.5.20
-
cpe:2.3:a:apache:tomcat:5.5.21
-
cpe:2.3:a:apache:tomcat:5.5.22
-
cpe:2.3:a:apache:tomcat:5.5.23
-
cpe:2.3:a:apache:tomcat:5.5.24
-
cpe:2.3:a:apache:tomcat:5.5.25
-
cpe:2.3:a:apache:tomcat:5.5.26
-
cpe:2.3:a:apache:tomcat:5.5.27
-
cpe:2.3:a:apache:tomcat:5.5.3
-
cpe:2.3:a:apache:tomcat:5.5.4
-
cpe:2.3:a:apache:tomcat:5.5.5
-
cpe:2.3:a:apache:tomcat:5.5.6
-
cpe:2.3:a:apache:tomcat:5.5.7
-
cpe:2.3:a:apache:tomcat:5.5.8
-
cpe:2.3:a:apache:tomcat:5.5.9
-
cpe:2.3:a:apache:tomcat:6.0.0
-
cpe:2.3:a:apache:tomcat:6.0.1
-
cpe:2.3:a:apache:tomcat:6.0.10
-
cpe:2.3:a:apache:tomcat:6.0.11
-
cpe:2.3:a:apache:tomcat:6.0.12
-
cpe:2.3:a:apache:tomcat:6.0.13
-
cpe:2.3:a:apache:tomcat:6.0.14
-
cpe:2.3:a:apache:tomcat:6.0.15
-
cpe:2.3:a:apache:tomcat:6.0.16
-
cpe:2.3:a:apache:tomcat:6.0.2
-
cpe:2.3:a:apache:tomcat:6.0.3
-
cpe:2.3:a:apache:tomcat:6.0.4
-
cpe:2.3:a:apache:tomcat:6.0.5
-
cpe:2.3:a:apache:tomcat:6.0.6
-
cpe:2.3:a:apache:tomcat:6.0.7
-
cpe:2.3:a:apache:tomcat:6.0.8
-
cpe:2.3:a:apache:tomcat:6.0.9