Bugzilla – Bug 887557
VUL-0: CVE-2014-0075: tomcat6 tomcat: Integer overflow in the parseChunkHeader
Last modified: 2014-09-01 09:57:31 UTC
via cve db CVE-2014-0075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075 Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. CONFIRM:http://svn.apache.org/viewvc?view=revision&revision=1578337 CONFIRM:http://svn.apache.org/viewvc?view=revision&revision=1578341 CONFIRM:http://svn.apache.org/viewvc?view=revision&revision=1579262 CONFIRM:http://tomcat.apache.org/security-6.html CONFIRM:http://tomcat.apache.org/security-7.html CONFIRM:http://tomcat.apache.org/security-8.html
This issue will be covered by the already running 6.0.41 tomcat6 version upgrade on SLES 11.
bugbot adjusting priority
was released