Bug 1072776 (CVE-2014-0075) - CVE-2014-0075 Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter
Summary: CVE-2014-0075 Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0075
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1102680 1102669 1102670 1102671 1102672 1102673 1102674 1102675 1102676 1102677 1102678 1102679 1102681 1102691 1102707 1102709 1102711 1102713 1102714 1102716 1102717 1102718 1102719 1102720 1102721 1102722 1102725 1105089 1105092 1113319 1113326 1113339 1160690
Blocks: 1072779 1079805 1082938 1097027 1103878 1105099 1105100 1105275 1108465 1120975 1181883 1182400 1182419 1200191
TreeView+ depends on / blocked
 
Reported: 2014-03-05 08:24 UTC by David Jorm
Modified: 2019-09-29 13:14 UTC (History)
51 users (show)

Fixed In Version: tomcat 7.0.53, tomcat 6.0.41
Doc Type: Bug Fix
Doc Text:
It was discovered that JBoss Web / Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against JBoss Web / Apache Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources.
Clone Of:
Environment:
Last Closed: 2019-06-08 02:31:51 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0827 normal SHIPPED_LIVE Moderate: tomcat security update 2014-07-02 12:44:18 UTC
Red Hat Product Errata RHSA-2014:0833 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.0.1 tomcat6 security update 2014-07-03 21:06:00 UTC
Red Hat Product Errata RHSA-2014:0834 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.0.1 tomcat6 security and bug fix update 2014-07-03 21:01:15 UTC
Red Hat Product Errata RHSA-2014:0835 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.0.1 tomcat7 security update 2014-07-03 21:01:05 UTC
Red Hat Product Errata RHSA-2014:0836 normal SHIPPED_LIVE Moderate: Red Hat JBoss Web Server 2.0.1 tomcat7 security update 2014-07-03 21:00:58 UTC
Red Hat Product Errata RHSA-2014:0842 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.2.4 security update 2014-07-07 18:49:59 UTC
Red Hat Product Errata RHSA-2014:0843 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.2.4 security update 2014-07-07 18:49:49 UTC
Red Hat Product Errata RHSA-2014:0865 normal SHIPPED_LIVE Moderate: tomcat6 security and bug fix update 2014-07-09 19:16:10 UTC
Red Hat Product Errata RHSA-2014:0895 normal SHIPPED_LIVE Moderate: Red Hat JBoss Data Grid 6.3.0 update 2014-07-16 21:12:23 UTC
Red Hat Product Errata RHSA-2014:1149 normal SHIPPED_LIVE Moderate: Red Hat JBoss Operations Network 3.2.3 update 2014-09-03 22:04:38 UTC
Red Hat Product Errata RHSA-2015:0234 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.0.3 security update 2015-02-18 03:27:47 UTC
Red Hat Product Errata RHSA-2015:0235 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.3 security update 2015-02-18 03:27:36 UTC
Red Hat Product Errata RHSA-2015:0675 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.1.0 update 2015-03-11 20:51:21 UTC
Red Hat Product Errata RHSA-2015:0720 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse Service Works 6.0.0 security update 2015-03-25 01:05:53 UTC
Red Hat Product Errata RHSA-2015:0765 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.0.0 security update 2015-03-31 21:00:43 UTC
Red Hat Product Errata RHSA-2015:1009 normal SHIPPED_LIVE Important: Red Hat JBoss Portal 6.2.0 update 2015-05-14 19:14:47 UTC

Description David Jorm 2014-03-05 08:24:52 UTC
Apache Tomcat did not limit the length of chunk sizes when using chunked transfer coding. A remote attacker could use this flaw to perform a denial of service attack against Tomcat, by streaming an unlimited quantity of data, leading to consumption of server resources.

Comment 1 Vincent Danen 2014-05-29 03:22:18 UTC
Upstream patch commits:

Tomcat 6: http://svn.apache.org/viewvc?view=revision&revision=1579262

Tomcat 7: http://svn.apache.org/viewvc?view=revision&revision=1578341

Comment 2 Trevor Jay 2014-05-29 05:22:39 UTC
Acknowledgements:

This issue was discovered by David Jorm of Red Hat Product Security.

Comment 12 errata-xmlrpc 2014-07-02 08:44:58 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:0827 https://rhn.redhat.com/errata/RHSA-2014-0827.html

Comment 13 errata-xmlrpc 2014-07-03 17:01:34 UTC
This issue has been addressed in following products:

  JBoss Enterprise Web Server 2.0.1

Via RHSA-2014:0836 https://rhn.redhat.com/errata/RHSA-2014-0836.html

Comment 14 errata-xmlrpc 2014-07-03 17:02:30 UTC
This issue has been addressed in following products:

  JBEWS 2 for RHEL 5
  JBEWS 2 for RHEL 6

Via RHSA-2014:0835 https://rhn.redhat.com/errata/RHSA-2014-0835.html

Comment 15 errata-xmlrpc 2014-07-03 17:06:08 UTC
This issue has been addressed in following products:

  JBoss Enterprise Web Server 2.0.1

Via RHSA-2014:0833 https://rhn.redhat.com/errata/RHSA-2014-0833.html

Comment 16 errata-xmlrpc 2014-07-03 18:30:22 UTC
This issue has been addressed in following products:

  JBEWS 2 for RHEL 5
  JBEWS 2 for RHEL 6

Via RHSA-2014:0834 https://rhn.redhat.com/errata/RHSA-2014-0834.html

Comment 17 errata-xmlrpc 2014-07-07 14:50:06 UTC
This issue has been addressed in following products:

  JBEAP 6.2 for RHEL 6
  JBEAP 6.2 for RHEL 5

Via RHSA-2014:0843 https://rhn.redhat.com/errata/RHSA-2014-0843.html

Comment 18 errata-xmlrpc 2014-07-07 14:51:03 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.2.4

Via RHSA-2014:0842 https://rhn.redhat.com/errata/RHSA-2014-0842.html

Comment 21 Arun Babu Neelicattu 2014-07-09 01:08:54 UTC
Statement:

This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for  Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 22 errata-xmlrpc 2014-07-09 15:16:19 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0865 https://rhn.redhat.com/errata/RHSA-2014-0865.html

Comment 24 errata-xmlrpc 2014-07-16 17:13:01 UTC
This issue has been addressed in following products:

  JBoss Data Grid 6.3.0

Via RHSA-2014:0895 https://rhn.redhat.com/errata/RHSA-2014-0895.html

Comment 25 Martin Prpič 2014-07-17 14:33:19 UTC
IssueDescription:

It was discovered that JBoss Web / Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against JBoss Web / Apache Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources.

Comment 26 errata-xmlrpc 2014-09-03 18:04:59 UTC
This issue has been addressed in following products:

  Red Hat JBoss Operations Network 3.2.3

Via RHSA-2014:1149 https://rhn.redhat.com/errata/RHSA-2014-1149.html

Comment 32 errata-xmlrpc 2015-02-17 22:28:00 UTC
This issue has been addressed in the following products:

  Red Hat JBoss BRMS 6.0.3

Via RHSA-2015:0235 https://rhn.redhat.com/errata/RHSA-2015-0235.html

Comment 33 errata-xmlrpc 2015-02-17 22:31:48 UTC
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite 6.0.3

Via RHSA-2015:0234 https://rhn.redhat.com/errata/RHSA-2015-0234.html

Comment 35 Fedora Update System 2015-02-23 08:02:59 UTC
tomcat-7.0.59-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 36 errata-xmlrpc 2015-03-11 16:52:17 UTC
This issue has been addressed in the following products:

JBoss Data Virtualization 6.1.0

Via RHSA-2015:0675 https://rhn.redhat.com/errata/RHSA-2015-0675.html

Comment 37 errata-xmlrpc 2015-03-24 21:06:16 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Fuse Service Works 6.0.0

Via RHSA-2015:0720 https://rhn.redhat.com/errata/RHSA-2015-0720.html

Comment 38 errata-xmlrpc 2015-03-31 17:01:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.0.0

Via RHSA-2015:0765 https://rhn.redhat.com/errata/RHSA-2015-0765.html

Comment 39 errata-xmlrpc 2015-05-14 15:16:56 UTC
This issue has been addressed in the following products:

  JBoss Portal 6.2.0

Via RHSA-2015:1009 https://rhn.redhat.com/errata/RHSA-2015-1009.html


Note You need to log in before you can comment on or make changes to this bug.