Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1191200 - (CVE-2014-0230) CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload
CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting a...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20140719,reported=2...
: Security
Depends On: 1227592 1227593 1236893 1236899 1236905 1236910 1236915 1236920 1259358 1259359 1352004
Blocks: 1191201 1253310
  Show dependency treegraph
 
Reported: 2015-02-10 11:38 EST by Vasyl Kaigorodov
Modified: 2018-09-27 07:47 EDT (History)
73 users (show)

See Also:
Fixed In Version: tomcat 6.0.44, tomcat 7.0.55, tomcat 8.0.9
Doc Type: Bug Fix
Doc Text:
It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1621 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.1.0 tomcat security update 2015-08-13 15:30:33 EDT
Red Hat Product Errata RHSA-2015:1622 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.1.0 tomcat security update 2015-08-13 15:29:23 EDT
Red Hat Product Errata RHSA-2015:2659 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 3.0.2 security update 2015-12-16 18:20:00 EST
Red Hat Product Errata RHSA-2015:2660 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 3.0.2 security update 2015-12-16 18:19:47 EST
Red Hat Product Errata RHSA-2015:2661 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 3.0.2 security update 2015-12-16 18:19:41 EST
Red Hat Product Errata RHSA-2016:0595 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update 2016-04-05 20:39:55 EDT
Red Hat Product Errata RHSA-2016:0596 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update 2016-04-05 20:39:02 EDT
Red Hat Product Errata RHSA-2016:0597 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update 2016-04-05 20:38:09 EDT
Red Hat Product Errata RHSA-2016:0598 normal SHIPPED_LIVE Moderate: jboss-ec2-eap security, bug fix, and enhancement update 2016-04-05 20:37:54 EDT
Red Hat Product Errata RHSA-2016:0599 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update 2016-04-05 22:20:53 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-02-10 11:38:32 EST
When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited Denial of Service as Tomcat would never close the connection and a processing thread would remain allocated to the connection.

Upstream fix:

http://svn.apache.org/viewvc?view=revision&revision=1603781
http://svn.apache.org/viewvc?view=revision&revision=1603811
http://svn.apache.org/viewvc?view=revision&revision=1609176
http://svn.apache.org/viewvc?view=revision&revision=1659295
Comment 7 Jason Shepherd 2015-06-29 00:21:58 EDT
I tested this vulnerability against the version of Tomcat6 shipped with RHEL 6.6 and found it to be unaffected. I'm updating the whiteboard to reflect that.
Comment 11 Jason Shepherd 2015-06-29 22:15:32 EDT
Created tomcat tracking bugs for this issue:

Affects: epel-6 [bug 1236920]
Comment 13 errata-xmlrpc 2015-08-13 11:29:45 EDT
This issue has been addressed in the following products:

  JBEWS 2 for RHEL 7
  JBEWS 2 for RHEL 6
  JBEWS 2 for RHEL 5

Via RHSA-2015:1622 https://rhn.redhat.com/errata/RHSA-2015-1622.html
Comment 14 errata-xmlrpc 2015-08-13 11:31:10 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 2.1.0

Via RHSA-2015:1621 https://rhn.redhat.com/errata/RHSA-2015-1621.html
Comment 19 errata-xmlrpc 2015-12-16 13:21:21 EST
This issue has been addressed in the following products:

  JBoss Web Server 3.0.2

Via RHSA-2015:2661 https://rhn.redhat.com/errata/RHSA-2015-2661.html
Comment 20 errata-xmlrpc 2015-12-16 13:22:02 EST
This issue has been addressed in the following products:

  JWS 3.0 for RHEL 7

Via RHSA-2015:2660 https://access.redhat.com/errata/RHSA-2015:2660
Comment 21 errata-xmlrpc 2015-12-16 13:22:45 EST
This issue has been addressed in the following products:

  JWS 3.0 for RHEL 6

Via RHSA-2015:2659 https://access.redhat.com/errata/RHSA-2015:2659
Comment 22 errata-xmlrpc 2016-04-05 16:41:09 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 6

Via RHSA-2016:0598 https://rhn.redhat.com/errata/RHSA-2016-0598.html
Comment 23 errata-xmlrpc 2016-04-05 16:42:34 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 7

Via RHSA-2016:0597 https://rhn.redhat.com/errata/RHSA-2016-0597.html
Comment 24 errata-xmlrpc 2016-04-05 16:43:39 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 6

Via RHSA-2016:0596 https://rhn.redhat.com/errata/RHSA-2016-0596.html
Comment 25 errata-xmlrpc 2016-04-05 16:44:42 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 5

Via RHSA-2016:0595 https://rhn.redhat.com/errata/RHSA-2016-0595.html
Comment 26 errata-xmlrpc 2016-04-05 18:21:01 EDT
This issue has been addressed in the following products:



Via RHSA-2016:0599 https://rhn.redhat.com/errata/RHSA-2016-0599.html
Comment 27 errata-xmlrpc 2016-04-28 13:41:56 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 6

Via RHSA-2016:0596 https://rhn.redhat.com/errata/RHSA-2016-0596.html
Comment 28 errata-xmlrpc 2016-04-28 13:42:30 EDT
This issue has been addressed in the following products:

  JBEAP 6.4.z for RHEL 5

Via RHSA-2016:0595 https://rhn.redhat.com/errata/RHSA-2016-0595.html
Comment 29 Tomas Hoger 2018-09-27 07:47:05 EDT
The tomcat packages in Red Hat Enterprise Linux 7 were updated to the fixed upstream version via the following erratum, released as part of the Red Hat Enterprise Linux 7.3.

https://access.redhat.com/errata/RHSA-2016:2599

Note You need to log in before you can comment on or make changes to this bug.