U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-1304

Change History

Initial Analysis by NIST 3/26/2018 1:19:14 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (including) 7.0.84
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (including) 8.0.49
     *cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 8.5.0 up to (including) 8.5.27
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (including) 9.0.4
     *cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m10:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m11:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m12:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m13:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m14:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m15:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m16:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m17:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m18:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m19:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m2:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m20:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m21:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m22:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m23:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m24:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m25:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m26:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m27:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m3:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m4:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m5:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m6:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m7:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m8:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:m9:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
CWE-254
Changed Reference Type
http://www.securityfocus.com/bid/103170 No Types Assigned
http://www.securityfocus.com/bid/103170 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1040427 No Types Assigned
http://www.securitytracker.com/id/1040427 Third Party Advisory, VDB Entry
Changed Reference Type
https://access.redhat.com/errata/RHSA-2018:0465 No Types Assigned
https://access.redhat.com/errata/RHSA-2018:0465 Patch, Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2018:0466 No Types Assigned
https://access.redhat.com/errata/RHSA-2018:0466 Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html Issue Tracking, Third Party Advisory