{
  "threat_severity" : "Moderate",
  "public_date" : "2012-01-17T00:00:00Z",
  "bugzilla" : {
    "description" : "tomcat: information disclosure due to improper response and request object recycling",
    "id" : "782624",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=782624"
  },
  "cvss" : {
    "cvss_base_score" : "4.0",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "status" : "verified"
  },
  "details" : [ "Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data." ],
  "affected_release" : [ {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1 for RHEL 5",
    "release_date" : "2012-05-21T00:00:00Z",
    "advisory" : "RHSA-2012:0682",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
    "package" : "tomcat6-0:6.0.32-24_patch_07.ep5.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1 for RHEL 6",
    "release_date" : "2012-05-21T00:00:00Z",
    "advisory" : "RHSA-2012:0682",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1::el6",
    "package" : "tomcat6-0:6.0.32-24_patch_07.ep5.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 1.0",
    "release_date" : "2012-05-21T00:00:00Z",
    "advisory" : "RHSA-2012:0681",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "tomcat6",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-3375\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-3375" ],
  "name" : "CVE-2011-3375",
  "csaw" : false
}