Описание
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat BPM Suite 6 | jbossweb | Affected | ||
Red Hat Developer Toolset 2.0 | devtoolset-2-tomcat | Not affected | ||
Red Hat Enterprise Linux 5 | tomcat5 | Will not fix | ||
Red Hat JBoss BRMS 6 | jbossweb | Affected | ||
Red Hat JBoss Data Grid 6 | jbossweb | Affected | ||
Red Hat JBoss Data Virtualization 6 | jbossweb | Affected | ||
Red Hat JBoss Enterprise Application Platform 5 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | others | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | tomcat5 | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | tomcat6 | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apach ...
ELSA-2015-0991: tomcat6 security and bug fix update (MODERATE)
EPSS
4.3 Medium
CVSS2