Author: jfclere
Date: Wed Feb 10 08:32:11 2010
New Revision: 908386
URL: http://svn.apache.org/viewvc?rev=908386&view=rev
Log:
Just a ref to Not a vulnerability in Tomcat.
Modified:
tomcat/site/trunk/docs/security-6.html
tomcat/site/trunk/xdocs/security-6.xml
Modified: tomcat/site/trunk/docs/security-6.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=908386&r1=908385&r2=908386&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Wed Feb 10 08:32:11 2010
@@ -309,15 +309,9 @@
CVE-2009-3555</a>
</p>
- <p>The TLS protocol, and the SSL protocol 3.0 and possibly earlier does not
- properly associate renegotiation handshakes with an existing connection,
- which allows man-in-the-middle attackers to insert data into HTTPS
- sessions, and possibly other types of sessions protected by TLS or SSL,
- by sending an unauthenticated request that is processed retroactively by
- a server in a post-renegotiation context, related to a "plaintext
- injection" attack, aka the "Project Mogul" issue.</p>
+ <p>See Not a vulnerability in Tomcat below</p>
- <p>This was fixed in
+ <p>This was worked-around in
<a href="http://svn.apache.org/viewvc?rev=891292&view=rev">
revision 891292</a> and
<a href="http://svn.apache.org/viewvc?rev=881774&view=rev">
Modified: tomcat/site/trunk/xdocs/security-6.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=908386&r1=908385&r2=908386&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Wed Feb 10 08:32:11 2010
@@ -98,15 +98,9 @@
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">
CVE-2009-3555</a></p>
- <p>The TLS protocol, and the SSL protocol 3.0 and possibly earlier does not
- properly associate renegotiation handshakes with an existing connection,
- which allows man-in-the-middle attackers to insert data into HTTPS
- sessions, and possibly other types of sessions protected by TLS or SSL,
- by sending an unauthenticated request that is processed retroactively by
- a server in a post-renegotiation context, related to a "plaintext
- injection" attack, aka the "Project Mogul" issue.</p>
+ <p>See Not a vulnerability in Tomcat below</p>
- <p>This was fixed in
+ <p>This was worked-around in
<a href="http://svn.apache.org/viewvc?rev=891292&view=rev">
revision 891292</a> and
<a href="http://svn.apache.org/viewvc?rev=881774&view=rev">
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]