CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
91.0%
java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a “Content-Length: 0” AJP request to trigger a hang in request processing.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | tomcat | 8.0.0 | cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* |
apache | tomcat | 8.0.0 | cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* |
apache | tomcat | 8.0.0 | cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* |
apache | tomcat | 8.0.0 | cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* |
apache | tomcat | 8.0.1 | cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:* |
apache | tomcat | 8.0.3 | cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:* |
seclists.org/fulldisclosure/2014/May/134
secunia.com/advisories/59873
secunia.com/advisories/60729
svn.apache.org/viewvc?view=revision&revision=1578392
tomcat.apache.org/security-8.html
www-01.ibm.com/support/docview.wss?uid=swg21678231
www-01.ibm.com/support/docview.wss?uid=swg21681528
www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
www.securityfocus.com/bid/67673
www.securitytracker.com/id/1030300