The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN89379547/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121 - VDB Entry, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html - | |
References | () http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2068.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2069.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2070.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2071.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2072.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2599.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2807.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2808.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0457.html - | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1743480 - | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1743722 - Vendor Advisory | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1743738 - Vendor Advisory | |
References | () http://svn.apache.org/viewvc?view=revision&revision=1743742 - Vendor Advisory | |
References | () http://tomcat.apache.org/security-7.html - Vendor Advisory | |
References | () http://tomcat.apache.org/security-8.html - Vendor Advisory | |
References | () http://tomcat.apache.org/security-9.html - Vendor Advisory | |
References | () http://www.debian.org/security/2016/dsa-3609 - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3611 - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3614 - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - | |
References | () http://www.securityfocus.com/bid/91453 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036427 - | |
References | () http://www.securitytracker.com/id/1036900 - | |
References | () http://www.securitytracker.com/id/1037029 - | |
References | () http://www.securitytracker.com/id/1039606 - | |
References | () http://www.ubuntu.com/usn/USN-3024-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3027-1 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:0455 - | |
References | () https://access.redhat.com/errata/RHSA-2017:0456 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1349468 - Issue Tracking | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371 - Patch, Permissions Required, Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840 - | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759 - | |
References | () https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://security.gentoo.org/glsa/201705-09 - | |
References | () https://security.gentoo.org/glsa/202107-39 - | |
References | () https://security.netapp.com/advisory/ntap-20190212-0001/ - | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - |
07 Nov 2023, 02:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-07-04 22:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3092
Mitre link : CVE-2016-3092
CVE.ORG link : CVE-2016-3092
JSON object : View
Products Affected
apache
- commons_fileupload
- tomcat
canonical
- ubuntu_linux
hp
- icewall_identity_manager
- icewall_sso_agent_option
debian
- debian_linux
CWE
CWE-20
Improper Input Validation