Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0099

Опубликовано: 27 мая 2014
Источник: redhat
CVSS2: 5.8
EPSS Средний

Описание

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly.

Отчет

This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 2.0devtoolset-2-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Operations Network 3jbosswebAffected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2014:086509.07.2014
Red Hat Enterprise Linux 7tomcatFixedRHSA-2014:082702.07.2014
Red Hat JBoss BPMS 6.0jbosswebFixedRHSA-2015:023417.02.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1102030Tomcat/JBossWeb: Request smuggling via malicious content length header

EPSS

Процентиль: 99%
0.6961
Средний

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

nvd
около 11 лет назад

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

debian
около 11 лет назад

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apac ...

github
около 3 лет назад

Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Tomcat

fstec
около 11 лет назад

Уязвимость программного обеспечения Apache Tomcat, позволяющая удаленному злоумышленнику нарушить защищаемой информации

EPSS

Процентиль: 99%
0.6961
Средний

5.8 Medium

CVSS2