Vulnerability Description
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | 7.0.0 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0268.html
- http://linux.oracle.com/errata/ELSA-2014-0865.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.h
- http://marc.info/?l=bugtraq&m=141017844705317&w=2
- http://marc.info/?l=bugtraq&m=141390017113542&w=2
- http://marc.info/?l=bugtraq&m=144498216801440&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0675.html
- http://rhn.redhat.com/errata/RHSA-2015-0720.html
- http://rhn.redhat.com/errata/RHSA-2015-0765.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/59121
- http://secunia.com/advisories/59616
- http://secunia.com/advisories/59678
- http://secunia.com/advisories/59732
- http://secunia.com/advisories/59835
FAQ
What is CVE-2014-0075?
CVE-2014-0075 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote...
How severe is CVE-2014-0075?
CVE-2014-0075 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0075?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat.