RULE(RULE ID:311602)

Rule General Information
Release Date: 2019-10-15
Rule Name: Apache Tomcat ChunkedInputFilter Denial of Service Vulnerability (CVE-2014-0227)
Severity:
CVE ID:
Rule Protection Details
Description: java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
Impact: An attacker can launch a denial of service attack by exploiting the vulnerability successfully.
Affected OS: Windows, Others
Reference: SecurityFocusBID:72717
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://tomcat.apache.org/security-6.html