First published: Fri Jun 13 2014(Updated: )
`java/org/apache/coyote/http11/filters/ChunkedInputFilter.java` in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=8.0.0<8.0.9 | 8.0.9 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.55 | 7.0.55 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.42 | 6.0.42 |
redhat/JBossWeb | <7.4.6. | 7.4.6. |
redhat/Tomcat | <7.0.55 | 7.0.55 |
redhat/Tomcat | <6.0.43 | 6.0.43 |
Tomcat | =6.0.0 | |
Tomcat | =6.0.0-alpha | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.1-alpha | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.2-alpha | |
Tomcat | =6.0.2-beta | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.4-alpha | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.6-alpha | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.7-alpha | |
Tomcat | =6.0.7-beta | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.8-alpha | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.9-beta | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =6.0.33 | |
Tomcat | =6.0.35 | |
Tomcat | =6.0.36 | |
Tomcat | =6.0.37 | |
Tomcat | =6.0.39 | |
Tomcat | =6.0.41 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.2-beta | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.4-beta | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 | |
Tomcat | =7.0.12 | |
Tomcat | =7.0.13 | |
Tomcat | =7.0.14 | |
Tomcat | =7.0.15 | |
Tomcat | =7.0.16 | |
Tomcat | =7.0.17 | |
Tomcat | =7.0.18 | |
Tomcat | =7.0.19 | |
Tomcat | =7.0.20 | |
Tomcat | =7.0.21 | |
Tomcat | =7.0.22 | |
Tomcat | =7.0.23 | |
Tomcat | =7.0.24 | |
Tomcat | =7.0.25 | |
Tomcat | =7.0.26 | |
Tomcat | =7.0.27 | |
Tomcat | =7.0.28 | |
Tomcat | =7.0.29 | |
Tomcat | =7.0.30 | |
Tomcat | =7.0.31 | |
Tomcat | =7.0.32 | |
Tomcat | =7.0.33 | |
Tomcat | =7.0.34 | |
Tomcat | =7.0.35 | |
Tomcat | =7.0.36 | |
Tomcat | =7.0.37 | |
Tomcat | =7.0.38 | |
Tomcat | =7.0.39 | |
Tomcat | =7.0.40 | |
Tomcat | =7.0.41 | |
Tomcat | =7.0.42 | |
Tomcat | =7.0.43 | |
Tomcat | =7.0.44 | |
Tomcat | =7.0.45 | |
Tomcat | =7.0.46 | |
Tomcat | =7.0.47 | |
Tomcat | =7.0.48 | |
Tomcat | =7.0.49 | |
Tomcat | =7.0.50 | |
Tomcat | =7.0.52 | |
Tomcat | =7.0.53 | |
Tomcat | =7.0.54 | |
Tomcat | =8.0.0-rc1 | |
Tomcat | =8.0.0-rc10 | |
Tomcat | =8.0.0-rc2 | |
Tomcat | =8.0.0-rc5 | |
Tomcat | =8.0.1 | |
Tomcat | =8.0.3 | |
Tomcat | =8.0.5 | |
Tomcat | =8.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0227 has a medium severity level, allowing for potential HTTP request smuggling attacks.
To fix CVE-2014-0227, upgrade Apache Tomcat to version 6.0.42, 7.0.55, or 8.0.9 or later.
CVE-2014-0227 affects Apache Tomcat versions 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9.
CVE-2014-0227 can facilitate HTTP request smuggling attacks due to improper handling of error states.
Yes, CVE-2014-0227 is specific to the Apache Tomcat web server framework.