Description
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
CVSS vector
AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9Complexity: Low
Confidentiality: None
Integrity: None
Affected Packages1 packages
🔴Vulnerability Details
5GHSAInteger Overflow or Wraparound in Apache Tomcat↗2022-05-14 ▶ OSVInteger Overflow or Wraparound in Apache Tomcat↗2022-05-14 ▶ OSVtomcat6, tomcat7 vulnerabilities↗2014-07-30 ▶ CVEListCVE-2014-0075: Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter↗2014-05-31 ▶ OSVCVE-2014-0075: Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter↗2014-05-31 ▶ 📋Vendor Advisories
3UbuntuTomcat vulnerabilities↗2014-07-30 ▶ Red HatTomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter↗2014-05-27 ▶ ApacheApache tomcat: CVE-2014-0075↗ ▶ 💬Community
2BugzillaCVE-2014-0075 tomcat: Limited DoS in chunked transfer encoding input filter [fedora-all]↗2014-05-29 ▶ BugzillaCVE-2014-0075 Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter↗2014-03-05 ▶