694
VMScore

CVE-2016-3092

Published: 04/07/2016 Updated: 08/12/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The MultipartStream class in Apache Commons Fileupload prior to 1.3.2, as used in Apache Tomcat 7.x prior to 7.0.70, 8.x prior to 8.0.36, 8.5.x prior to 8.5.3, and 9.x prior to 9.0.0.M7 and other products, allows remote malicious users to cause a denial of service (CPU consumption) via a long boundary string.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hp icewall sso agent option 10.0

hp icewall identity manager 5.0

apache tomcat 9.0.0

apache tomcat 8.0.30

apache tomcat 8.0.17

apache tomcat 8.0.26

apache tomcat 8.0.20

apache tomcat 8.0.5

apache tomcat 8.0.1

apache tomcat 8.0.0

apache tomcat 8.0.12

apache tomcat 8.0.27

apache tomcat 8.0.15

apache tomcat 8.0.22

apache tomcat 8.0.29

apache tomcat 8.0.11

apache tomcat 8.0.24

apache tomcat 8.0.23

apache tomcat 8.0.33

apache tomcat 8.0.21

apache tomcat 8.0.32

apache tomcat 8.0.18

apache tomcat 8.0.35

apache tomcat 8.0.3

apache tomcat 8.0.14

apache tomcat 8.0.8

apache tomcat 8.0.28

debian debian linux 8.0

apache tomcat 8.5.2

apache tomcat 8.5.0

apache commons fileupload

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

apache tomcat 7.0.2

apache tomcat 7.0.12

apache tomcat 7.0.62

apache tomcat 7.0.53

apache tomcat 7.0.20

apache tomcat 7.0.34

apache tomcat 7.0.8

apache tomcat 7.0.55

apache tomcat 7.0.1

apache tomcat 7.0.5

apache tomcat 7.0.4

apache tomcat 7.0.63

apache tomcat 7.0.22

apache tomcat 7.0.39

apache tomcat 7.0.26

apache tomcat 7.0.28

apache tomcat 7.0.59

apache tomcat 7.0.65

apache tomcat 7.0.0

apache tomcat 7.0.50

apache tomcat 7.0.6

apache tomcat 7.0.14

apache tomcat 7.0.11

apache tomcat 7.0.67

apache tomcat 7.0.23

apache tomcat 7.0.69

apache tomcat 7.0.52

apache tomcat 7.0.42

apache tomcat 7.0.37

apache tomcat 7.0.29

apache tomcat 7.0.68

apache tomcat 7.0.47

apache tomcat 7.0.41

apache tomcat 7.0.30

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 7.0.10

apache tomcat 7.0.25

apache tomcat 7.0.54

apache tomcat 7.0.35

apache tomcat 7.0.61

apache tomcat 7.0.57

apache tomcat 7.0.32

apache tomcat 7.0.21

apache tomcat 7.0.27

apache tomcat 7.0.40

apache tomcat 7.0.56

apache tomcat 7.0.64

apache tomcat 7.0.33

Vendor Advisories

Several security issues were fixed in Tomcat ...
Tomcat could be made to hang if it received specially crafted network traffic ...
The TERASOLUNA Framework Development Team discovered a denial of service vulnerability in Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications A remote attacker can take advantage of this flaw by sending file upload requests that cause the HTTP server using th ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections, bypass of the SecurityManager or denial of service For the stable distribution (jessie), these problems have been fixed in version 8014-1+deb8u2 For the unstable distribution (s ...
Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web ServerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Moderate: jboss-ec2-eap security and enhancement update for EAP 6411 Type/Severity Security Advisory: Moderate Topic An update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 64 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 6411 update on RHEL 7 Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform 6411, fix several bugs, and add various enhancements are now available for Red Hat Enterprise ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 6411 update on RHEL 5 Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform 6411, fix several bugs, and add various enhancements are now available for Red Hat Enterprise ...
Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Web Server 2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2 for RHEL 7Red Hat Product Security has rated this update ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 6411 update on RHEL 6 Type/Severity Security Advisory: Moderate Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform 6411, fix several bugs, and add various enhancements are now available for Red Hat Enterprise ...
Synopsis Important: Red Hat JBoss Web Server security and enhancement update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web ServerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System ...
A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long ...
A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long ...

References

CWE-20https://bugzilla.redhat.com/show_bug.cgi?id=1349468http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121http://svn.apache.org/viewvc?view=revision&revision=1743480http://svn.apache.org/viewvc?view=revision&revision=1743738http://tomcat.apache.org/security-8.htmlhttp://tomcat.apache.org/security-9.htmlhttp://tomcat.apache.org/security-7.htmlhttp://jvn.jp/en/jp/JVN89379547/index.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1743722http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3Ehttp://svn.apache.org/viewvc?view=revision&revision=1743742http://www.debian.org/security/2016/dsa-3614http://www.ubuntu.com/usn/USN-3027-1http://www.debian.org/security/2016/dsa-3611http://www.debian.org/security/2016/dsa-3609http://www.ubuntu.com/usn/USN-3024-1http://www.securityfocus.com/bid/91453https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.htmlhttps://security.gentoo.org/glsa/201705-09http://www.securitytracker.com/id/1037029http://www.securitytracker.com/id/1036900http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.securitytracker.com/id/1036427http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.securitytracker.com/id/1039606https://access.redhat.com/errata/RHSA-2017:0456https://access.redhat.com/errata/RHSA-2017:0455http://rhn.redhat.com/errata/RHSA-2017-0457.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2808.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2807.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2599.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2072.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2071.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2070.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2069.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2068.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://security.netapp.com/advisory/ntap-20190212-0001/https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://security.gentoo.org/glsa/202107-39https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Ehttps://nvd.nist.govhttps://usn.ubuntu.com/3024-1/