CVE-2014-0230
Publication date 7 June 2015
Last updated 24 July 2024
Ubuntu priority
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
From the Ubuntu Security Team
It was discovered that Tomcat incorrectly handled HTTP responses occurring before the entire request body was finished being read. A remote attacker could possibly use this issue to cause a limited denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat6 | 18.04 LTS bionic | Not in release |
16.04 LTS xenial |
Fixed 6.0.45+dfsg-1
|
|
14.04 LTS trusty |
Fixed 6.0.39-1ubuntu0.1
|
|
tomcat7 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 7.0.52-1ubuntu0.3
|
|
tomcat8 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
mdeslaur
ASF says this is a low severity issue that, unlike the original description, can't cause memory consumption, only a limited denial of service. http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
Patch details
Package | Patch details |
---|---|
tomcat6 | |
tomcat7 |
References
Related Ubuntu Security Notices (USN)
- USN-2655-1
- Tomcat vulnerabilities
- 25 June 2015
- USN-2654-1
- Tomcat vulnerabilities
- 25 June 2015