Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3447-1 | tomcat7 security update |
Debian DSA |
DSA-3530-1 | tomcat6 security update |
Github GHSA |
GHSA-475f-74wp-pqv5 | Integer Overflow or Wraparound in Apache Tomcat |
Ubuntu USN |
USN-2302-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:38.500Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0075
No data.
Status : Deferred
Published: 2014-05-31T11:17:13.093
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0075
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA
Ubuntu USN