|
|||
Rule General Information |
---|
Release Date: | 2019-06-26 | |
Rule Name: | Apache Tomcat FileUpload Content-Type Header Infinite Loop Denial Of Service Vulnerability (CVE-2014-0050) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:65400 http://advisories.mageia.org/MGASA-2014-0110.html http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html http://jvn.jp/en/jp/JVN14876762/index.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://svn.apache.org/viewvc?view=revision&revision;=r1565143 |