cvelist/2014/0xxx/CVE-2014-0230.json

222 lines
8.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 02:07:34 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0230",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
2018-07-18 09:04:41 -04:00
]
2019-03-18 02:07:34 +00:00
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "USN-2654-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2654-1"
},
{
"name": "RHSA-2015:1622",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1622.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://issues.jboss.org/browse/JWS-220",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/JWS-220"
},
{
"name": "DSA-3530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3530"
},
{
"name": "RHSA-2016:0599",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0599.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1603779",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1603779"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "HPSBUX03561",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=145974991225029&w=2"
},
{
"name": "[oss-security] 20150409 Apache Tomcat partial file upload DoS CVE-2014-0230",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/04/10/1"
},
{
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name": "RHSA-2015:2661",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-2661.html"
},
{
"name": "RHSA-2016:0596",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0596.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
},
{
"name": "RHSA-2016:0595",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0595.html"
},
{
"name": "RHSA-2015:2659",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2015:2659"
},
{
"name": "[tomcat-announce] 20150505 [SECURITY] CVE-2014-0230: Apache Tomcat DoS",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E"
},
{
"name": "HPSBOV03503",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=144498216801440&w=2"
},
{
"name": "RHSA-2016:0598",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0598.html"
},
{
"name": "RHSA-2015:2660",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2015:2660"
},
{
"name": "USN-2655-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2655-1"
},
{
"name": "RHSA-2015:1621",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1621.html"
},
{
"name": "74475",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74475"
},
{
"name": "https://issues.jboss.org/browse/JWS-219",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/JWS-219"
},
{
"name": "DSA-3447",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3447"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1603775",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1603775"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1603770",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1603770"
},
{
"name": "RHSA-2016:0597",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0597.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
2019-03-19 15:01:07 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
2019-03-18 02:07:34 +00:00
}
]
}
}