Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1109196 - (CVE-2014-0227) CVE-2014-0227 Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter
CVE-2014-0227 Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedIn...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150209,repor...
: Security
Depends On: 1109208 1160690 1109199 1109200 1109201 1109202 1109203 1109204 1109205 1109206 1109207 1109209 1109210 1109211 1109212 1109213 1109216 1109217 1109218 1109219 1109220 1109221 1109223 1109225 1109226 1109227 1109228 1109229 1190821
Blocks: 1082938 1119820 1119823 1127901 1181883 1182400 1182419 1200191
  Show dependency treegraph
 
Reported: 2014-06-13 08:55 EDT by Arun Babu Neelicattu
Modified: 2018-05-10 14:12 EDT (History)
28 users (show)

See Also:
Fixed In Version: JBossWeb 7.4.6.Final, Tomcat 7.0.55, Tomcat 6.0.43
Doc Type: Bug Fix
Doc Text:
It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0234 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.0.3 security update 2015-02-17 22:27:47 EST
Red Hat Product Errata RHSA-2015:0235 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.3 security update 2015-02-17 22:27:36 EST
Red Hat Product Errata RHSA-2015:0675 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.1.0 update 2015-03-11 16:51:21 EDT
Red Hat Product Errata RHSA-2015:0720 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse Service Works 6.0.0 security update 2015-03-24 21:05:53 EDT
Red Hat Product Errata RHSA-2015:0765 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.0.0 security update 2015-03-31 17:00:43 EDT
Red Hat Product Errata RHSA-2015:0983 normal SHIPPED_LIVE Moderate: tomcat security update 2015-05-12 16:37:36 EDT
Red Hat Product Errata RHSA-2015:0991 normal SHIPPED_LIVE Moderate: tomcat6 security and bug fix update 2015-05-12 18:20:15 EDT
Red Hat Product Errata RHSA-2015:1009 normal SHIPPED_LIVE Important: Red Hat JBoss Portal 6.2.0 update 2015-05-14 15:14:47 EDT

  None (edit)
Description Arun Babu Neelicattu 2014-06-13 08:55:29 EDT
It was discovered that the ChunkedInputFilter implementation did not fail subsequent attempts to read input early enough. A remote attacker could use this flaw to perform a denial of service attack, by streaming an unlimited quantity of data, leading to consumption of server resources.
Comment 1 Arun Babu Neelicattu 2014-06-13 08:59:54 EDT
Upstream Fix:

Tomcat: http://svn.apache.org/viewvc?view=revision&revision=1600984
JBossWeb: https://source.jboss.org/changelog/JBossWeb?cs=2455
Comment 19 Martin Prpič 2015-02-09 11:42:45 EST
Created tomcat tracking bugs for this issue:

Affects: fedora-all [bug 1190821]
Comment 21 errata-xmlrpc 2015-02-17 17:29:11 EST
This issue has been addressed in the following products:

  Red Hat JBoss BRMS 6.0.3

Via RHSA-2015:0235 https://rhn.redhat.com/errata/RHSA-2015-0235.html
Comment 22 errata-xmlrpc 2015-02-17 17:33:36 EST
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite 6.0.3

Via RHSA-2015:0234 https://rhn.redhat.com/errata/RHSA-2015-0234.html
Comment 24 Fedora Update System 2015-02-23 03:02:45 EST
tomcat-7.0.59-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 25 Tomas Hoger 2015-03-11 06:41:01 EDT
Tomcat upstream advisories (see comment 18 above) point out additional impact - request smuggling.  Tomcat may read next request from the malformed chunked request body, rather than aborting connection as soon as the first encoding issue is detected.

Upstream does not indicate where this may have practical impact, as Tomcat accepts multiple requests pipelined in a single connection.  It seems this may have impact in deployments where Tomcat is accessed via a reverse proxy that only exposes certain paths / web applications.  This may possibly allow bypass of proxy restrictions and allow access to URLs not exposed by the proxy.  However, this attack would require proxy to allow malformed requests to be passed to Tomcat.
Comment 26 errata-xmlrpc 2015-03-11 12:53:40 EDT
This issue has been addressed in the following products:

JBoss Data Virtualization 6.1.0

Via RHSA-2015:0675 https://rhn.redhat.com/errata/RHSA-2015-0675.html
Comment 27 errata-xmlrpc 2015-03-24 17:07:00 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse Service Works 6.0.0

Via RHSA-2015:0720 https://rhn.redhat.com/errata/RHSA-2015-0720.html
Comment 28 errata-xmlrpc 2015-03-31 13:01:54 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.0.0

Via RHSA-2015:0765 https://rhn.redhat.com/errata/RHSA-2015-0765.html
Comment 31 errata-xmlrpc 2015-05-12 12:37:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:0983 https://rhn.redhat.com/errata/RHSA-2015-0983.html
Comment 33 errata-xmlrpc 2015-05-12 14:20:33 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:0991 https://rhn.redhat.com/errata/RHSA-2015-0991.html
Comment 34 errata-xmlrpc 2015-05-14 11:21:18 EDT
This issue has been addressed in the following products:

  JBoss Portal 6.2.0

Via RHSA-2015:1009 https://rhn.redhat.com/errata/RHSA-2015-1009.html

Note You need to log in before you can comment on or make changes to this bug.