Name Last modified Size Description
Parent Directory - add-ons/ 2003-09-06 19:14 - apps/ 2003-09-06 19:14 - archive/ 2003-09-06 19:54 - bin/ 2003-09-06 19:14 - rpms/ 2003-09-06 18:34 - src/ 2003-09-06 19:13 - v3.3.2-patches/ 2007-07-24 02:43 - v3.3.2/ 2004-03-09 03:14 - KEYS 2003-09-06 18:33 5.9K RELEASE-NOTES-3.3.1a.txt 2003-09-06 18:33 19K
This is the root directory of the Tomcat 3.3.1a release, which is a patched release of Tomcat 3.3.1 Final.
Tomcat 3.3.1a is a security release that fixes the following vulnerabilities:
Vulnerability where, when used with JDK 1.3.1 or earlier, a maliciously crafted request could return a directory listing even when an index.html, index.jsp, or other welcome file is present. File contents can be returned as well. If you are using Tomcat 3.3.1 or earlier with JDK 1.3.1 or earlier, you should either upgrade to JDK 1.4 or later, or upgrade your Tomcat installation to Tomcat 3.3.1a.
Vulnerability where a malicious web application could read the contents of some files outside the web application via its web.xml file in spite of the presence of a security manager. The content of files that can be read as part of an XML document would be accessible. If you are running Tomcat 3.3.1 or earlier with a security manager, and are serving web applications whose web.xml content is not known to be safe, you should upgrade your Tomcat installation to 3.3.1a.
For instructions on how to patch an existing Tomcat 3.3.1
installation, or to download a full distribution, see the
Binary Distributions directory.
For source to the changed files and their compiled classes, or a full source distribution, see the Source Distributions directory.
Note: Only classes that required modification have be updated. Thus, the string that identifies the Tomcat version has not been updated. It will still indicate Tomcat 3.3.1 Final.
To address this security issue, administrators of public servers which have deployed any Apache Tomcat 3 version should make sure the 'examples' webapp is removed from the deployed Tomcat installation. Also, SnoopServlet.class should be removed from the 'ROOT' web application if still present in the installation.
These vulnerabilities will be removed from Tomcat 3.3.2 prior to release.
Background information on cross site scripting: This allows a mailicious
More information: http://httpd.apache.org/info/css-security/
You can find the various pieces of the release using the following links:
Documentation of what is different between Tomcat 3.3(a) and Tomcat 3.3.1a Final may be found here.
You may find online documentation for Tomcat 3.3.1 here.
Note: The tar files in this distribution use GNU tar extensions, and must be untarred with a GNU compatible version of tar. The version of tar on Solaris and Mac OS X will not work with these files.