java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a “Content-Length: 0” AJP request to trigger a hang in request processing.
seclists.org/fulldisclosure/2014/May/134
svn.apache.org/viewvc?view=revision&revision=1578392
tomcat.apache.org/security-8.html
www-01.ibm.com/support/docview.wss?uid=swg21678231
www-01.ibm.com/support/docview.wss?uid=swg21681528
www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
github.com/apache/tomcat
github.com/apache/tomcat/commit/8884dae60ace77a87ed9385442ce429e98c3a479
github.com/apache/tomcat80/commit/77590c897f0e542fe363d70efdf3b82209510aee
nvd.nist.gov/vuln/detail/CVE-2014-0095
web.archive.org/web/20140713043210/www.securitytracker.com/id/1030300
web.archive.org/web/20141126170141/www.securityfocus.com/bid/67673
web.archive.org/web/20151017043748/secunia.com/advisories/60729
web.archive.org/web/20161024215453/secunia.com/advisories/59873