logo

CVE-2014-0075 org.apache.tomcat:tomcat

Package

Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=0 <6.0.40 || >=7.0.0 <7.0.53 || >=8.0.0 <8.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:F/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.80198 pctl0.99082

Details

Integer Overflow or Wraparound in Apache Tomcat Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

Metadata

Created: 2022-05-14T01:10:19Z
Modified: 2025-04-14T21:40:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-475f-74wp-pqv5/GHSA-475f-74wp-pqv5.json
CWE IDs: ["CWE-190", "CWE-400"]
Alternative ID: GHSA-475f-74wp-pqv5
Finding: F111
Auto approve: 1