Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html - | |
References | () http://seclists.org/fulldisclosure/2014/Dec/23 - | |
References | () http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592&r2=1476591&pathrev=1476592 - Patch | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1378702 - Patch | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1378921 - Patch | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1476592 - Patch | |
References | () http://tomcat.apache.org/security-6.html - Vendor Advisory | |
References | () http://tomcat.apache.org/security-7.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html - | |
References | () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - | |
References | () http://www.securityfocus.com/archive/1/534161/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/59797 - | |
References | () http://www.securityfocus.com/bid/64758 - | |
References | () http://www.ubuntu.com/usn/USN-1841-1 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - | |
References | () https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E - |
07 Nov 2023, 02:11
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2013-06-01 14:21
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3544
Mitre link : CVE-2012-3544
CVE.ORG link : CVE-2012-3544
JSON object : View
Products Affected
apache
- tomcat
CWE
CWE-20
Improper Input Validation