A denial of service flaw was found in the way chunked transfer encoding input filter of Apache Tomcat, an Apache Servlet/JSP Engine, processed CRLF sequences at the end of data chunks in certain circumstances. When the chunked transfer encoding was enabled, a remote attacker could issue a specially-crafted request that, when processed would lead to (limited) denial of service of the Apache Tomcat server. Relevant upstream patch: * for Apache Tomcat 6.x: http://svn.apache.org/viewvc?view=revision&revision=1476592 * for Apache Tomcat 7:x: http://svn.apache.org/viewvc?view=rev&rev=1378702 http://svn.apache.org/viewvc?view=rev&rev=1378921
This issue did NOT affect the versions of the tomcat package, as shipped with Fedora release of 17 and 18 (the current versions already contain aforementioned upstream patch). -- This issue affects the versions of the tomcat6 package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created tomcat6 tracking bugs for this issue Affects: fedora-all [bug 961807]
Statement: This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.
This issue has been addressed in following products: JBEWS 2 for RHEL 6 Via RHSA-2013:1012 https://rhn.redhat.com/errata/RHSA-2013-1012.html
This issue has been addressed in following products: JBEWS 2 for RHEL 5 Via RHSA-2013:1011 https://rhn.redhat.com/errata/RHSA-2013-1011.html
This issue has been addressed in following products: Red Hat JBoss Web Server 2.0.1 Via RHSA-2013:1013 https://rhn.redhat.com/errata/RHSA-2013-1013.html