Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0230

Опубликовано: 19 июл. 2014
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.

It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat JBoss BRMS 5jbosswebUnder investigation
Red Hat JBoss Data Grid 6jbosswebAffected
Red Hat JBoss Data Virtualization 6jbosswebAffected
Red Hat JBoss Enterprise Application Platform 4jbosswebWill not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Fuse Service Works 6jbosswebUnder investigation

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1191200tomcat: non-persistent DoS attack by feeding data by aborting an upload

EPSS

Процентиль: 91%
0.06351
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.

nvd
около 10 лет назад

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.

debian
около 10 лет назад

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0 ...

github
больше 3 лет назад

Uncontrolled Resource Consumption in Apache Tomcat

suse-cvrf
почти 10 лет назад

Security update for tomcat6

EPSS

Процентиль: 91%
0.06351
Низкий

5 Medium

CVSS2