Описание
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly.
Отчет
This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Developer Toolset 2.0 | devtoolset-2-tomcat | Not affected | ||
Red Hat Enterprise Linux 5 | tomcat5 | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 5 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | others | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | tomcat5 | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | tomcat6 | Will not fix | ||
Red Hat JBoss Operations Network 3 | jbossweb | Affected | ||
Red Hat Enterprise Linux 6 | tomcat6 | Fixed | RHSA-2014:0865 | 09.07.2014 |
Red Hat Enterprise Linux 7 | tomcat | Fixed | RHSA-2014:0827 | 02.07.2014 |
Red Hat JBoss BPMS 6.0 | jbossweb | Fixed | RHSA-2015:0234 | 17.02.2015 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apac ...
Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Tomcat
Уязвимость программного обеспечения Apache Tomcat, позволяющая удаленному злоумышленнику нарушить защищаемой информации
EPSS
5.8 Medium
CVSS2