First published: Sat May 31 2014(Updated: )
java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.0.0-RC1<8.0.4 | 8.0.4 |
maven/org.apache.tomcat:tomcat-coyote | >=8.0.0-RC1<8.0.4 | 8.0.4 |
=8.0.0-rc1 | ||
=8.0.0-rc10 | ||
=8.0.0-rc2 | ||
=8.0.0-rc5 | ||
=8.0.1 | ||
=8.0.3 | ||
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc2 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0095 has a high severity because it allows remote attackers to cause a denial of service.
To fix CVE-2014-0095, upgrade to Apache Tomcat version 8.0.4 or later.
CVE-2014-0095 affects Apache Tomcat versions prior to 8.0.4, including various release candidates.
The impact of CVE-2014-0095 is that it can lead to thread consumption, causing the server to hang and become unresponsive.
Yes, CVE-2014-0095 is exploitable remotely, allowing attackers to trigger the denial of service without physical access.