Lucene search

K
f5F5F5:K16344
HistorySep 16, 2015 - 12:00 a.m.

K16344 : Apache Tomcat vulnerability CVE-2014-0227

2015-09-1600:00:00
my.f5.com
11

6.4 Medium

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.1%

Security Advisory Description

ava/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding. (CVE-2014-0227)

Impact

An attacker may be able to cause a denial-of-service (DoS).

6.4 Medium

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.1%