Skip to content

Integer Overflow or Wraparound in Apache Tomcat

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 22, 2024

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

< 6.0.40
>= 7.0.0, < 7.0.53
>= 8.0.0, < 8.0.4

Patched versions

6.0.40
7.0.53
8.0.4

Description

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.

References

Published by the National Vulnerability Database May 31, 2014
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 7, 2022
Last updated Feb 22, 2024

Severity

Moderate

EPSS score

3.844%
(92nd percentile)

CVE ID

CVE-2014-0075

GHSA ID

GHSA-475f-74wp-pqv5

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.