icon

We found results for “

CVE-2014-0227

Good to know:

icon
icon

Date: February 15, 2015

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

Language: Java

Severity Score

Related Resources (47)

Severity Score

Weakness Type (CWE)

Data Handling

CWE-19

Input Validation

CWE-20

Top Fix

icon

Upgrade Version

Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:8.0.9,7.0.55,org.apache.tomcat:coyote:6.0.43,org.apache.tomcat:tomcat-coyote:8.0.9,7.0.55

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): LOW

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us