[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-526 --- tomcat7

ID: oval:org.secpod.oval:def:1200067Date: (C)2015-12-29   (M)2023-12-14
Class: PATCHFamily: unix




It was discovered that JBoss Web / Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against JBoss Web / Apache Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources. It was found that the org.apache.catalina.servlets.DefaultServlet implementation in JBoss Web / Apache Tomcat allowed the definition of XML External Entities in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information. It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly. It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service

Platform:
Amazon Linux AMI
Product:
tomcat7
Reference:
ALAS-2015-526
CVE-2014-0075
CVE-2014-0096
CVE-2014-0099
CVE-2014-0227
CVE    4
CVE-2014-0227
CVE-2014-0075
CVE-2014-0096
CVE-2014-0099
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:tomcat7

© SecPod Technologies