Apache Tomcat 6.0.x < 6.0.43 Chunked Request Smuggling Vulnerability

Medium Nessus Network Monitor Plugin ID 8671

Synopsis

The remote web server is missing an Apache Tomcat patch update.

Description

Apache Tomcat 6.x before 6.0.43 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service by streaming data with malformed chunked transfer coding. (CVE-2014-0227)

Solution

Update to Apache Tomcat version 6.0.43 or later.

See Also

https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43

Plugin Details

Severity: Medium

ID: 8671

Family: Web Servers

Published: 2015/04/10

Modified: 2017/02/02

Dependencies: 8927

Nessus ID: 81579

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.4

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 6.4

Temporal Score: 6.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Patch Publication Date: 2014/11/22

Vulnerability Publication Date: 2015/02/15

Reference Information

CVE: CVE-2014-0227

BID: 72717

IAVA: 2016-A-0226