First published: Tue Feb 10 2015(Updated: )
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <6.0.44 | 6.0.44 |
redhat/tomcat | <7.0.55 | 7.0.55 |
redhat/tomcat | <8.0.9 | 8.0.9 |
maven/org.apache.tomcat:tomcat | >=8.0.0<8.0.9 | 8.0.9 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.55 | 7.0.55 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.44 | 6.0.44 |
Tomcat | =6.0.0 | |
Tomcat | =6.0.0-alpha | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.1-alpha | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.2-alpha | |
Tomcat | =6.0.2-beta | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.4-alpha | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.6-alpha | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.7-alpha | |
Tomcat | =6.0.7-beta | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.8-alpha | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.9-beta | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =6.0.33 | |
Tomcat | =6.0.35 | |
Tomcat | =6.0.36 | |
Tomcat | =6.0.37 | |
Tomcat | =6.0.39 | |
Tomcat | =6.0.41 | |
Tomcat | =6.0.43 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.2-beta | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.4-beta | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 | |
Tomcat | =7.0.12 | |
Tomcat | =7.0.13 | |
Tomcat | =7.0.14 | |
Tomcat | =7.0.15 | |
Tomcat | =7.0.16 | |
Tomcat | =7.0.17 | |
Tomcat | =7.0.18 | |
Tomcat | =7.0.19 | |
Tomcat | =7.0.20 | |
Tomcat | =7.0.21 | |
Tomcat | =7.0.22 | |
Tomcat | =7.0.23 | |
Tomcat | =7.0.24 | |
Tomcat | =7.0.25 | |
Tomcat | =7.0.26 | |
Tomcat | =7.0.27 | |
Tomcat | =7.0.28 | |
Tomcat | =7.0.29 | |
Tomcat | =7.0.30 | |
Tomcat | =7.0.31 | |
Tomcat | =7.0.32 | |
Tomcat | =7.0.33 | |
Tomcat | =7.0.34 | |
Tomcat | =7.0.35 | |
Tomcat | =7.0.36 | |
Tomcat | =7.0.37 | |
Tomcat | =7.0.38 | |
Tomcat | =7.0.39 | |
Tomcat | =7.0.40 | |
Tomcat | =7.0.41 | |
Tomcat | =7.0.42 | |
Tomcat | =7.0.43 | |
Tomcat | =7.0.44 | |
Tomcat | =7.0.45 | |
Tomcat | =7.0.46 | |
Tomcat | =7.0.47 | |
Tomcat | =7.0.48 | |
Tomcat | =7.0.49 | |
Tomcat | =7.0.50 | |
Tomcat | =7.0.52 | |
Tomcat | =7.0.53 | |
Tomcat | =7.0.54 | |
Tomcat | =8.0.0-rc1 | |
Tomcat | =8.0.0-rc10 | |
Tomcat | =8.0.0-rc2 | |
Tomcat | =8.0.0-rc5 | |
Tomcat | =8.0.1 | |
Tomcat | =8.0.3 | |
Tomcat | =8.0.5 | |
Tomcat | =8.0.8 | |
Oracle Virtualization | =4.63 | |
Oracle Virtualization | =4.71 | |
Oracle Virtualization | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0230 has a medium severity rating due to its potential to cause denial of service attacks.
To fix CVE-2014-0230, upgrade to Apache Tomcat version 6.0.44 or later, 7.0.55 or later, or 8.0.9 or later.
CVE-2014-0230 affects Apache Tomcat versions 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9.
Yes, CVE-2014-0230 can be exploited remotely by attackers, allowing them to execute denial of service attacks.
The implications of CVE-2014-0230 include thread consumption and potential service disruption for web applications running on the affected versions of Tomcat.