First published: Sat May 31 2014(Updated: )
java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.0.0-RC1<8.0.4 | 8.0.4 |
maven/org.apache.tomcat:tomcat-coyote | >=8.0.0-RC1<8.0.4 | 8.0.4 |
=8.0.0-rc1 | ||
=8.0.0-rc10 | ||
=8.0.0-rc2 | ||
=8.0.0-rc5 | ||
=8.0.1 | ||
=8.0.3 | ||
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc2 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.