CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
91.0%
java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a “Content-Length: 0” AJP request to trigger a hang in request processing.
Vendor | Product | Version | CPE |
---|---|---|---|
org.apache.tomcat.embed | tomcat-embed-core | * | cpe:2.3:a:org.apache.tomcat.embed:tomcat-embed-core:*:*:*:*:*:*:*:* |
org.apache.tomcat | tomcat-coyote | * | cpe:2.3:a:org.apache.tomcat:tomcat-coyote:*:*:*:*:*:*:*:* |
seclists.org/fulldisclosure/2014/May/134
svn.apache.org/viewvc?view=revision&revision=1578392
tomcat.apache.org/security-8.html
www-01.ibm.com/support/docview.wss?uid=swg21678231
www-01.ibm.com/support/docview.wss?uid=swg21681528
www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
github.com/advisories/GHSA-wf5v-jhxj-q632
github.com/apache/tomcat/commit/8884dae60ace77a87ed9385442ce429e98c3a479
github.com/apache/tomcat80/commit/77590c897f0e542fe363d70efdf3b82209510aee
nvd.nist.gov/vuln/detail/CVE-2014-0095
web.archive.org/web/20140713043210/www.securitytracker.com/id/1030300
web.archive.org/web/20141126170141/www.securityfocus.com/bid/67673
web.archive.org/web/20151017043748/secunia.com/advisories/60729
web.archive.org/web/20161024215453/secunia.com/advisories/59873