Gravité: : Faible
  Identifiant(s) CVE: : CVE-2010-1157
  Date du conseil: 21 juillet 2015

  Description

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1004116
  Trend Micro Deep Security DPI Rule Name: 1004116 - Apache Tomcat Authentication Header Realm Name Information Disclosure Vulnerability

  Affected software and version:

  • Apache Tomcat 5.5.0
  • Apache Tomcat 5.5.1
  • Apache Tomcat 5.5.10
  • Apache Tomcat 5.5.11
  • Apache Tomcat 5.5.12
  • Apache Tomcat 5.5.13
  • Apache Tomcat 5.5.14
  • Apache Tomcat 5.5.16
  • Apache Tomcat 5.5.15
  • Apache Tomcat 5.5.17
  • Apache Tomcat 5.5.18
  • Apache Tomcat 5.5.19
  • Apache Tomcat 5.5.2
  • Apache Tomcat 5.5.20
  • Apache Tomcat 5.5.21
  • Apache Tomcat 5.5.22
  • Apache Tomcat 5.5.23
  • Apache Tomcat 5.5.24
  • Apache Tomcat 5.5.25
  • Apache Tomcat 5.5.26
  • Apache Tomcat 5.5.27
  • Apache Tomcat 5.5.28
  • Apache Tomcat 5.5.29
  • Apache Tomcat 5.5.3
  • Apache Tomcat 5.5.4
  • Apache Tomcat 5.5.5
  • Apache Tomcat 5.5.6
  • Apache Tomcat 5.5.7
  • Apache Tomcat 5.5.8
  • Apache Tomcat 5.5.9
  • Apache Tomcat 6.0.0
  • Apache Tomcat 6.0.1
  • Apache Tomcat 6.0.10
  • Apache Tomcat 6.0.11
  • Apache Tomcat 6.0.12
  • Apache Tomcat 6.0.13
  • Apache Tomcat 6.0.14
  • Apache Tomcat 6.0.15
  • Apache Tomcat 6.0.16
  • Apache Tomcat 6.0.17
  • Apache Tomcat 6.0.18
  • Apache Tomcat 6.0.19
  • Apache Tomcat 6.0.2
  • Apache Tomcat 6.0.20
  • Apache Tomcat 6.0.24
  • Apache Tomcat 6.0.26
  • Apache Tomcat 6.0.3
  • Apache Tomcat 6.0.4
  • Apache Tomcat 6.0.5
  • Apache Tomcat 6.0.6
  • Apache Tomcat 6.0.7
  • Apache Tomcat 6.0.8
  • Apache Tomcat 6.0.9