Lucene search

K
tomcatApache TomcatTOMCAT:AC89226F467ACA1B5EE7147D39391784
HistoryNov 22, 2014 - 12:00 a.m.

Fixed in Apache Tomcat 6.0.43

2014-11-2200:00:00
Apache Tomcat
tomcat.apache.org
34

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.2%

Note: The issue below was fixed in Apache Tomcat 6.0.42 but the release vote for the 6.0.42 release candidate did not pass. Therefore, although users must download 6.0.43 to obtain a version that includes a fix for this issue, version 6.0.42 is not included in the list of affected versions.

Important: Request Smuggling CVE-2014-0227

It was possible to craft a malformed chunk as part of a chunked request that caused Tomcat to read part of the request body as a new request.

This was fixed in revision 1603628.

This issue was identified by the Tomcat security team on 30 May 2014 and made public on 9 February 2015.

Affects: 6.0.0 to 6.0.41

CPENameOperatorVersion
apache tomcatge6.0.0
apache tomcatle6.0.41

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.2%