Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0075

Опубликовано: 27 мая 2014
Источник: redhat
CVSS2: 4.3

Описание

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

It was discovered that JBoss Web / Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against JBoss Web / Apache Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources.

Отчет

This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 2.0devtoolset-2-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Operations Network 3jbosswebAffected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2014:086509.07.2014
Red Hat Enterprise Linux 7tomcatFixedRHSA-2014:082702.07.2014
Red Hat JBoss BPMS 6.0jbosswebFixedRHSA-2015:023417.02.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1072776Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

nvd
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

debian
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/c ...

github
около 3 лет назад

Integer Overflow or Wraparound in Apache Tomcat

fstec
около 11 лет назад

Уязвимость программного обеспечения Apache Tomcat, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

4.3 Medium

CVSS2