CVE-2014-0050

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0110.html
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html Exploit
http://jvn.jp/en/jp/JVN14876762/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E
http://marc.info/?l=bugtraq&m=143136844732487&w=2
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
http://rhn.redhat.com/errata/RHSA-2014-0252.html
http://rhn.redhat.com/errata/RHSA-2014-0253.html
http://rhn.redhat.com/errata/RHSA-2014-0400.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57915
http://secunia.com/advisories/58075
http://secunia.com/advisories/58976
http://secunia.com/advisories/59039
http://secunia.com/advisories/59041
http://secunia.com/advisories/59183
http://secunia.com/advisories/59184
http://secunia.com/advisories/59185
http://secunia.com/advisories/59187
http://secunia.com/advisories/59232
http://secunia.com/advisories/59399
http://secunia.com/advisories/59492
http://secunia.com/advisories/59500
http://secunia.com/advisories/59725
http://secunia.com/advisories/60475
http://secunia.com/advisories/60753
http://svn.apache.org/r1565143 Patch
http://tomcat.apache.org/security-7.html Patch Vendor Advisory
http://tomcat.apache.org/security-8.html Patch Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
http://www.debian.org/security/2014/dsa-2856
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/archive/1/532549/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65400
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/202107-39
http://advisories.mageia.org/MGASA-2014-0110.html
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html Exploit
http://jvn.jp/en/jp/JVN14876762/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E
http://marc.info/?l=bugtraq&m=143136844732487&w=2
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
http://rhn.redhat.com/errata/RHSA-2014-0252.html
http://rhn.redhat.com/errata/RHSA-2014-0253.html
http://rhn.redhat.com/errata/RHSA-2014-0400.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57915
http://secunia.com/advisories/58075
http://secunia.com/advisories/58976
http://secunia.com/advisories/59039
http://secunia.com/advisories/59041
http://secunia.com/advisories/59183
http://secunia.com/advisories/59184
http://secunia.com/advisories/59185
http://secunia.com/advisories/59187
http://secunia.com/advisories/59232
http://secunia.com/advisories/59399
http://secunia.com/advisories/59492
http://secunia.com/advisories/59500
http://secunia.com/advisories/59725
http://secunia.com/advisories/60475
http://secunia.com/advisories/60753
http://svn.apache.org/r1565143 Patch
http://tomcat.apache.org/security-7.html Patch Vendor Advisory
http://tomcat.apache.org/security-8.html Patch Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
http://www.debian.org/security/2014/dsa-2856
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/archive/1/532549/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65400
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/202107-39
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:commons_fileupload:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0110.html - () http://advisories.mageia.org/MGASA-2014-0110.html -
References () http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html - Exploit () http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html - Exploit
References () http://jvn.jp/en/jp/JVN14876762/index.html - () http://jvn.jp/en/jp/JVN14876762/index.html -
References () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017 - () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017 -
References () http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E - () http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E -
References () http://marc.info/?l=bugtraq&m=143136844732487&w=2 - () http://marc.info/?l=bugtraq&m=143136844732487&w=2 -
References () http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html - () http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0252.html - () http://rhn.redhat.com/errata/RHSA-2014-0252.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0253.html - () http://rhn.redhat.com/errata/RHSA-2014-0253.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0400.html - () http://rhn.redhat.com/errata/RHSA-2014-0400.html -
References () http://seclists.org/fulldisclosure/2014/Dec/23 - () http://seclists.org/fulldisclosure/2014/Dec/23 -
References () http://secunia.com/advisories/57915 - () http://secunia.com/advisories/57915 -
References () http://secunia.com/advisories/58075 - () http://secunia.com/advisories/58075 -
References () http://secunia.com/advisories/58976 - () http://secunia.com/advisories/58976 -
References () http://secunia.com/advisories/59039 - () http://secunia.com/advisories/59039 -
References () http://secunia.com/advisories/59041 - () http://secunia.com/advisories/59041 -
References () http://secunia.com/advisories/59183 - () http://secunia.com/advisories/59183 -
References () http://secunia.com/advisories/59184 - () http://secunia.com/advisories/59184 -
References () http://secunia.com/advisories/59185 - () http://secunia.com/advisories/59185 -
References () http://secunia.com/advisories/59187 - () http://secunia.com/advisories/59187 -
References () http://secunia.com/advisories/59232 - () http://secunia.com/advisories/59232 -
References () http://secunia.com/advisories/59399 - () http://secunia.com/advisories/59399 -
References () http://secunia.com/advisories/59492 - () http://secunia.com/advisories/59492 -
References () http://secunia.com/advisories/59500 - () http://secunia.com/advisories/59500 -
References () http://secunia.com/advisories/59725 - () http://secunia.com/advisories/59725 -
References () http://secunia.com/advisories/60475 - () http://secunia.com/advisories/60475 -
References () http://secunia.com/advisories/60753 - () http://secunia.com/advisories/60753 -
References () http://svn.apache.org/r1565143 - Patch () http://svn.apache.org/r1565143 - Patch
References () http://tomcat.apache.org/security-7.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-7.html - Patch, Vendor Advisory
References () http://tomcat.apache.org/security-8.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-8.html - Patch, Vendor Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=swg21669554 - () http://www-01.ibm.com/support/docview.wss?uid=swg21669554 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21675432 - () http://www-01.ibm.com/support/docview.wss?uid=swg21675432 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676091 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676091 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676092 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676092 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676401 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676401 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676403 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676403 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676405 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676405 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676410 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676410 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676656 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676656 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676853 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676853 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21677691 - () http://www-01.ibm.com/support/docview.wss?uid=swg21677691 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21677724 - () http://www-01.ibm.com/support/docview.wss?uid=swg21677724 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21681214 - () http://www-01.ibm.com/support/docview.wss?uid=swg21681214 -
References () http://www.debian.org/security/2014/dsa-2856 - () http://www.debian.org/security/2014/dsa-2856 -
References () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html - () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html -
References () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html - () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html -
References () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html - () http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html -
References () http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm - () http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 -
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html -
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -
References () http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - () http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html -
References () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -
References () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -
References () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -
References () http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - () http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -
References () http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - () http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html -
References () http://www.securityfocus.com/archive/1/532549/100/0/threaded - () http://www.securityfocus.com/archive/1/532549/100/0/threaded -
References () http://www.securityfocus.com/archive/1/534161/100/0/threaded - () http://www.securityfocus.com/archive/1/534161/100/0/threaded -
References () http://www.securityfocus.com/bid/65400 - () http://www.securityfocus.com/bid/65400 -
References () http://www.ubuntu.com/usn/USN-2130-1 - () http://www.ubuntu.com/usn/USN-2130-1 -
References () http://www.vmware.com/security/advisories/VMSA-2014-0007.html - () http://www.vmware.com/security/advisories/VMSA-2014-0007.html -
References () http://www.vmware.com/security/advisories/VMSA-2014-0008.html - () http://www.vmware.com/security/advisories/VMSA-2014-0008.html -
References () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - () http://www.vmware.com/security/advisories/VMSA-2014-0012.html -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1062337 - () https://bugzilla.redhat.com/show_bug.cgi?id=1062337 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 -
References () https://security.gentoo.org/glsa/202107-39 - () https://security.gentoo.org/glsa/202107-39 -

07 Nov 2023, 02:18

Type Values Removed Values Added
References
  • {'url': 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E', 'name': '[commons-dev] 20140206 [SECURITY] CVE-2014-0050 Apache Commons FileUpload and Apache Tomcat DoS', 'tags': [], 'refsource': 'MLIST'}
  • () http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E -

Information

Published : 2014-04-01 06:27

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0050

Mitre link : CVE-2014-0050

CVE.ORG link : CVE-2014-0050


JSON object : View

Products Affected

apache

  • commons_fileupload
  • tomcat

oracle

  • retail_applications
CWE
CWE-264

Permissions, Privileges, and Access Controls