7.8
CVSSv2

CVE-2014-0230

Published: 07/06/2015 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Apache Tomcat 6.x prior to 6.0.44, 7.x prior to 7.0.55, and 8.x prior to 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote malicious users to cause a denial of service (thread consumption) via a series of aborted upload attempts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 7.0.2

apache tomcat 6.0.33

apache tomcat 6.0.0

apache tomcat 7.0.49

apache tomcat 6.0.39

apache tomcat 7.0.12

apache tomcat 6.0.6

apache tomcat 7.0.53

apache tomcat 6.0.4

apache tomcat 7.0.20

apache tomcat 6.0.11

apache tomcat 7.0.34

apache tomcat 7.0.8

apache tomcat 7.0.1

apache tomcat 7.0.5

apache tomcat 7.0.4

apache tomcat 6.0.7

apache tomcat 7.0.22

apache tomcat 7.0.39

apache tomcat 7.0.26

apache tomcat 7.0.46

apache tomcat 8.0.5

apache tomcat 6.0.15

apache tomcat 7.0.28

apache tomcat 8.0.1

apache tomcat 7.0.0

apache tomcat 7.0.50

apache tomcat 7.0.6

apache tomcat 8.0.0

apache tomcat 7.0.18

apache tomcat 6.0.20

apache tomcat 7.0.14

apache tomcat 6.0.9

apache tomcat 6.0.10

apache tomcat 6.0.31

apache tomcat 6.0.29

apache tomcat 7.0.48

apache tomcat 7.0.11

apache tomcat 6.0.3

apache tomcat 7.0.23

apache tomcat 6.0.1

apache tomcat 6.0.24

apache tomcat 7.0.44

apache tomcat 6.0.37

apache tomcat 6.0.17

apache tomcat 7.0.7

apache tomcat 7.0.52

apache tomcat 7.0.42

apache tomcat 6.0.32

apache tomcat 6.0.28

apache tomcat 7.0.37

apache tomcat 7.0.29

apache tomcat 7.0.45

apache tomcat 7.0.13

apache tomcat 7.0.47

apache tomcat 6.0.14

apache tomcat 7.0.41

apache tomcat 7.0.31

apache tomcat 7.0.30

apache tomcat 7.0.15

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 6.0.41

apache tomcat 7.0.10

apache tomcat 7.0.36

apache tomcat 7.0.25

apache tomcat 6.0.12

apache tomcat 7.0.54

apache tomcat 7.0.35

apache tomcat 8.0.3

apache tomcat 6.0.18

apache tomcat 7.0.43

apache tomcat 6.0.2

apache tomcat 7.0.32

apache tomcat 7.0.38

apache tomcat 6.0.43

apache tomcat 6.0.5

apache tomcat 7.0.21

apache tomcat 7.0.27

apache tomcat 7.0.24

apache tomcat 7.0.17

apache tomcat 7.0.40

apache tomcat 6.0.30

apache tomcat 7.0.9

apache tomcat 6.0.13

apache tomcat 8.0.8

apache tomcat 7.0.3

apache tomcat 6.0.8

apache tomcat 6.0.26

apache tomcat 6.0.19

apache tomcat 6.0.27

apache tomcat 6.0.35

apache tomcat 6.0.16

apache tomcat 6.0.36

apache tomcat 7.0.33

oracle virtualization 4.71

oracle virtualization 4.63

oracle virtualization 5.1

Vendor Advisories

Debian Bug report logs - #785316 CVE-2014-0230: non-persistent DoS attack by feeding data aborting an upload Package: src:tomcat6; Maintainer for src:tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Santiago Ruano Rincón <santiagorr@riseupnet> Date: Thu, 14 May 2015 15: ...
Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 6Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 7Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
Several security issues were fixed in Tomcat ...
Several security issues were fixed in Tomcat ...
It was discovered that malicious web applications could use the Expression Language to bypass protections of a Security Manager as expressions were evaluated within a privileged code section For the oldstable distribution (wheezy), this problem has been fixed in version 7028-4+deb7u3 This update also provides fixes for CVE-2013-4444, CVE-2014-0 ...
It was found that the expression language resolver evaluated expressions within a privileged code section A malicious web application could use this flaw to bypass security manager protections (CVE-2014-7810) It was found that Tomcat would keep connections open after processing requests with a large enough request body A remote attacker could po ...

Github Repositories

About This is the source code behind the paper "A Screening Test for Disclosed Vulnerabilities in FOSS Components" The tool allows to identify and extract the potentially vulnerable coding (using a commit that fixed a CVE), and track its origins in the repository history to identify the versions that are likely not affected by a CVE The project consists of two part

References

CWE-399http://openwall.com/lists/oss-security/2015/04/10/1http://svn.apache.org/viewvc?view=revision&revision=1603770http://svn.apache.org/viewvc?view=revision&revision=1603779http://tomcat.apache.org/security-6.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1603775http://tomcat.apache.org/security-8.htmlhttp://tomcat.apache.org/security-7.htmlhttp://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3Ehttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://www.debian.org/security/2016/dsa-3530http://rhn.redhat.com/errata/RHSA-2016-0599.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0597.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0598.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0595.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0596.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964http://marc.info/?l=bugtraq&m=145974991225029&w=2http://marc.info/?l=bugtraq&m=144498216801440&w=2http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2661.htmlhttps://access.redhat.com/errata/RHSA-2015:2659https://access.redhat.com/errata/RHSA-2015:2660https://issues.jboss.org/browse/JWS-220https://issues.jboss.org/browse/JWS-219http://www.debian.org/security/2016/dsa-3447https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013http://rhn.redhat.com/errata/RHSA-2015-1622.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1621.htmlhttp://www.ubuntu.com/usn/USN-2655-1http://www.securityfocus.com/bid/74475http://www.ubuntu.com/usn/USN-2654-1http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3Ehttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785316https://nvd.nist.govhttps://usn.ubuntu.com/2654-1/