CVE-2012-3544

medium

Description

Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.

References

http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html

http://seclists.org/fulldisclosure/2014/Dec/23

https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E

http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java?r1=1476592&r2=1476591&pathrev=1476592

http://svn.apache.org/viewvc?view=revision&revision=1378702

http://svn.apache.org/viewvc?view=revision&revision=1378921

http://svn.apache.org/viewvc?view=revision&revision=1476592

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-7.html

http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html

http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

http://www.ubuntu.com/usn/USN-1841-1

http://www.vmware.com/security/advisories/VMSA-2014-0012.html

Details

Source: Mitre, NVD

Published: 2013-06-01

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium