CVE-2014-0230

Publication date 7 June 2015

Last updated 24 July 2024


Ubuntu priority

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.

From the Ubuntu Security Team

It was discovered that Tomcat incorrectly handled HTTP responses occurring before the entire request body was finished being read. A remote attacker could possibly use this issue to cause a limited denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
tomcat6 18.04 LTS bionic Not in release
17.10 artful Not in release
17.04 zesty Not in release
16.10 yakkety Not in release
16.04 LTS xenial
Fixed 6.0.45+dfsg-1
15.10 wily Ignored end of life
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 6.0.39-1ubuntu0.1
12.04 LTS precise
Fixed 6.0.35-1ubuntu3.6
10.04 LTS lucid Ignored end of life
tomcat7 18.04 LTS bionic
Not affected
17.10 artful
Not affected
17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid
Not affected
14.10 utopic
Not affected
14.04 LTS trusty
Fixed 7.0.52-1ubuntu0.3
12.04 LTS precise Ignored end of life
10.04 LTS lucid Not in release
tomcat8 18.04 LTS bionic
Not affected
17.10 artful
Not affected
17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid
Not affected
14.10 utopic
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Not in release

Notes


mdeslaur

ASF says this is a low severity issue that, unlike the original description, can't cause memory consumption, only a limited denial of service. http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
tomcat6
tomcat7

References

Related Ubuntu Security Notices (USN)

Other references