tomcat6: CVE-2014-0227: HTTP request smuggling or DoS by streaming malformed data

Related Vulnerabilities: CVE-2014-0227  

Debian Bug report logs - #785312
tomcat6: CVE-2014-0227: HTTP request smuggling or DoS by streaming malformed data

version graph

Reported by: Santiago Ruano Rincón <santiagorr@riseup.net>

Date: Thu, 14 May 2015 14:51:01 UTC

Severity: important

Tags: fixed-upstream, patch, security, squeeze, upstream, wheezy

Found in version tomcat6/6.0.35-6+deb7u1

Fixed in version tomcat6/6.0.45+dfsg-1~deb7u1

Done: Emmanuel Bourg <ebourg@apache.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#785312; Package src:tomcat6. (Thu, 14 May 2015 14:51:06 GMT) (full text, mbox, link).


Acknowledgement sent to Santiago Ruano Rincón <santiagorr@riseup.net>:
New Bug report received and forwarded. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Thu, 14 May 2015 14:51:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Santiago Ruano Rincón <santiagorr@riseup.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Cc: Debian LTS <debian-lts@lists.debian.org>
Subject: tomcat6: CVE-2014-0227: HTTP request smuggling or DoS by streaming malformed data
Date: Thu, 14 May 2015 16:48:23 +0200
[Message part 1 (text/plain, inline)]
Source: tomcat6
Version: 6.0.35-6+deb7u1
Severity: important
Tags: security patch upstream fixed-upstream

Hi there,

The following vulnerability affects current tomcat 6.x in squeeze and wheezy.

According to CVE-2014-0227 [cve], "Apache Tomcat 6.x before 6.0.42, 7.x before
7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue
reading data after an error has occurred, which allows remote attackers to
conduct HTTP request smuggling attacks or cause a denial of service (resource
consumption) by streaming data with malformed chunked transfer coding".

I have prepared the attached patch, based on [fix].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

[cve] https://security-tracker.debian.org/tracker/CVE-2014-0227 
[fix] https://svn.apache.org/viewvc?view=revision&revision=1603628

Please adjust the affected versions in the BTS as needed.

Cheers,

Santiago
[CVE-2014-0227.patch (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]

Added tag(s) wheezy and squeeze. Request was from Emmanuel Bourg <ebourg@apache.org> to control@bugs.debian.org. (Tue, 19 Jul 2016 11:24:04 GMT) (full text, mbox, link).


Marked as fixed in versions tomcat6/6.0.45+dfsg-1~deb7u1. Request was from Emmanuel Bourg <ebourg@apache.org> to control@bugs.debian.org. (Tue, 19 Jul 2016 11:27:03 GMT) (full text, mbox, link).


Marked Bug as done Request was from Emmanuel Bourg <ebourg@apache.org> to control@bugs.debian.org. (Tue, 19 Jul 2016 11:33:05 GMT) (full text, mbox, link).


Notification sent to Santiago Ruano Rincón <santiagorr@riseup.net>:
Bug acknowledged by developer. (Tue, 19 Jul 2016 11:33:06 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 17 Aug 2016 07:27:16 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:14:09 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.