Your submission was sent successfully! Close

CVE-2014-0099

Published: 31 May 2014

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

From the Ubuntu security team

It was discovered that Tomcat incorrectly handled certain Content-Length headers. A remote attacker could use this flaw in configurations where Tomcat is behind a reverse proxy to perform HTTP request smuggling attacks.

Priority

Medium

Status

Package Release Status
tomcat6
Launchpad, Ubuntu, Debian
Upstream
Released (6.0.41-1)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(6.0.41-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (6.0.39-1ubuntu0.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1580473
tomcat7
Launchpad, Ubuntu, Debian
Upstream
Released (7.0.53-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(7.0.53-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(7.0.53-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (7.0.52-1ubuntu0.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1578814
tomcat8
Launchpad, Ubuntu, Debian
Upstream
Released (8.0.5-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(8.0.9-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(8.0.9-1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist