Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:11682
HistoryJan 15, 2019 - 9:06 a.m.

Denial Of Service (DoS) In ChunkedInputFilter

2019-01-1509:06:04
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
8

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding. The ChunkedInputFilter implementation did not fail subsequent attempts to read input after a failure occurred. A remote attacker could use this flaw to perform a denial of service attack by streaming an unlimited quantity of data, leading to excessive consumption of system resources.clarification

References

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P