First published: Thu Jun 23 2016(Updated: )
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/commons-fileupload:commons-fileupload | <1.3.2 | 1.3.2 |
redhat/tomcat | <7.0.70 | 7.0.70 |
redhat/tomcat | <8.5.3 | 8.5.3 |
redhat/tomcat | <8.0.36 | 8.0.36 |
HPE IceWall | =5.0 | |
HP IceWall SSO | =10.0 | |
Tomcat | =9.0.0-milestone1 | |
Tomcat | =9.0.0-milestone3 | |
Tomcat | =9.0.0-milestone4 | |
Tomcat | =9.0.0-milestone6 | |
Tomcat | =8.0.0-rc1 | |
Tomcat | =8.0.0-rc10 | |
Tomcat | =8.0.0-rc2 | |
Tomcat | =8.0.0-rc5 | |
Tomcat | =8.0.1 | |
Tomcat | =8.0.3 | |
Tomcat | =8.0.5 | |
Tomcat | =8.0.8 | |
Tomcat | =8.0.11 | |
Tomcat | =8.0.12 | |
Tomcat | =8.0.14 | |
Tomcat | =8.0.15 | |
Tomcat | =8.0.17 | |
Tomcat | =8.0.18 | |
Tomcat | =8.0.20 | |
Tomcat | =8.0.21 | |
Tomcat | =8.0.22 | |
Tomcat | =8.0.23 | |
Tomcat | =8.0.24 | |
Tomcat | =8.0.26 | |
Tomcat | =8.0.27 | |
Tomcat | =8.0.28 | |
Tomcat | =8.0.29 | |
Tomcat | =8.0.30 | |
Tomcat | =8.0.32 | |
Tomcat | =8.0.33 | |
Tomcat | =8.0.35 | |
Debian | =8.0 | |
Tomcat | =8.5.0 | |
Tomcat | =8.5.2 | |
Apache Commons FileUpload | <=1.3.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.2-beta | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.4-beta | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.5-beta | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 | |
Tomcat | =7.0.12 | |
Tomcat | =7.0.14 | |
Tomcat | =7.0.16 | |
Tomcat | =7.0.19 | |
Tomcat | =7.0.20 | |
Tomcat | =7.0.21 | |
Tomcat | =7.0.22 | |
Tomcat | =7.0.23 | |
Tomcat | =7.0.25 | |
Tomcat | =7.0.26 | |
Tomcat | =7.0.27 | |
Tomcat | =7.0.28 | |
Tomcat | =7.0.29 | |
Tomcat | =7.0.30 | |
Tomcat | =7.0.32 | |
Tomcat | =7.0.33 | |
Tomcat | =7.0.34 | |
Tomcat | =7.0.35 | |
Tomcat | =7.0.37 | |
Tomcat | =7.0.39 | |
Tomcat | =7.0.40 | |
Tomcat | =7.0.41 | |
Tomcat | =7.0.42 | |
Tomcat | =7.0.47 | |
Tomcat | =7.0.50 | |
Tomcat | =7.0.52 | |
Tomcat | =7.0.53 | |
Tomcat | =7.0.54 | |
Tomcat | =7.0.55 | |
Tomcat | =7.0.56 | |
Tomcat | =7.0.57 | |
Tomcat | =7.0.59 | |
Tomcat | =7.0.61 | |
Tomcat | =7.0.62 | |
Tomcat | =7.0.63 | |
Tomcat | =7.0.64 | |
Tomcat | =7.0.65 | |
Tomcat | =7.0.67 | |
Tomcat | =7.0.68 | |
Tomcat | =7.0.69 | |
Tomcat | =9.0.0-m1 | |
Tomcat | =9.0.0-m3 | |
Tomcat | =9.0.0-m4 | |
Tomcat | =9.0.0-m6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3092 is classified as a high severity vulnerability due to its potential to cause denial of service.
To remediate CVE-2016-3092, upgrade Apache Commons Fileupload to version 1.3.2 or later, and ensure Apache Tomcat is updated to at least version 7.0.70, 8.0.36, 8.5.3, or 9.0.0-M7.
CVE-2016-3092 allows remote attackers to perform denial of service attacks by sending long boundary strings that consume excessive CPU resources.
Affected versions include Apache Commons Fileupload prior to 1.3.2 and various Apache Tomcat versions below specified thresholds.
No, if the software has been updated to the fixed versions, the risk associated with CVE-2016-3092 is mitigated.