Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0075

Опубликовано: 31 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 5

Описание

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

not-affected

6.0.41-1
esm-infra-legacy/trusty

not-affected

6.0.39-1ubuntu0.1
lucid

released

6.0.24-2ubuntu1.16
precise

released

6.0.35-1ubuntu3.5
precise/esm

not-affected

6.0.35-1ubuntu3.5
saucy

ignored

end of life
trusty

released

6.0.39-1ubuntu0.1

Показывать по

РелизСтатусПримечание
artful

not-affected

7.0.53-1
bionic

not-affected

7.0.53-1
devel

not-affected

7.0.53-1
esm-apps/bionic

not-affected

7.0.53-1
esm-apps/xenial

not-affected

7.0.53-1
esm-infra-legacy/trusty

not-affected

7.0.52-1ubuntu0.1
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
saucy

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

not-affected

8.0.9-1
bionic

not-affected

8.0.9-1
devel

not-affected

8.0.9-1
esm-apps/bionic

not-affected

8.0.9-1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

8.0.9-1
lucid

DNE

precise

DNE

precise/esm

DNE

saucy

DNE

Показывать по

EPSS

Процентиль: 99%
0.87628
Высокий

5 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

nvd
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

debian
около 11 лет назад

Integer overflow in the parseChunkHeader function in java/org/apache/c ...

github
около 3 лет назад

Integer Overflow or Wraparound in Apache Tomcat

fstec
около 11 лет назад

Уязвимость программного обеспечения Apache Tomcat, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 99%
0.87628
Высокий

5 Medium

CVSS2