Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0050

Опубликовано: 01 апр. 2014
Источник: debian
EPSS Критический

Описание

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcommons-fileupload-javafixed1.3.1-1package
tomcat7fixed7.0.52-1package
tomcat6not-affectedpackage

Примечания

  • http://svn.apache.org/viewvc?view=revision&revision=1565169

  • CVE might be splitted

EPSS

Процентиль: 100%
0.92678
Критический

Связанные уязвимости

ubuntu
больше 11 лет назад

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

redhat
больше 11 лет назад

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

nvd
больше 11 лет назад

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

github
больше 6 лет назад

Commons FileUpload Denial of service vulnerability

CVSS3: 6.3
fstec
больше 11 лет назад

Уязвимость файла MultipartStream.java библиотеки Apache Commons FileUpload, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 100%
0.92678
Критический