CVE-2014-0050

critical

Description

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

References

https://security.gentoo.org/glsa/202107-39

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755

https://bugzilla.redhat.com/show_bug.cgi?id=1062337

http://www.vmware.com/security/advisories/VMSA-2014-0012.html

http://www.vmware.com/security/advisories/VMSA-2014-0008.html

http://www.vmware.com/security/advisories/VMSA-2014-0007.html

http://www.ubuntu.com/usn/USN-2130-1

http://www.securityfocus.com/bid/65400

http://www.securityfocus.com/archive/1/534161/100/0/threaded

http://www.securityfocus.com/archive/1/532549/100/0/threaded

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

http://www.mandriva.com/security/advisories?name=MDVSA-2015:084

http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm

http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html

http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html

http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html

http://www.debian.org/security/2014/dsa-2856

http://www-01.ibm.com/support/docview.wss?uid=swg21681214

http://www-01.ibm.com/support/docview.wss?uid=swg21677724

http://www-01.ibm.com/support/docview.wss?uid=swg21677691

http://www-01.ibm.com/support/docview.wss?uid=swg21676853

http://www-01.ibm.com/support/docview.wss?uid=swg21676656

http://www-01.ibm.com/support/docview.wss?uid=swg21676410

http://www-01.ibm.com/support/docview.wss?uid=swg21676405

http://www-01.ibm.com/support/docview.wss?uid=swg21676403

http://www-01.ibm.com/support/docview.wss?uid=swg21676401

http://www-01.ibm.com/support/docview.wss?uid=swg21676092

http://www-01.ibm.com/support/docview.wss?uid=swg21676091

http://www-01.ibm.com/support/docview.wss?uid=swg21675432

http://www-01.ibm.com/support/docview.wss?uid=swg21669554

http://tomcat.apache.org/security-8.html

http://tomcat.apache.org/security-7.html

http://svn.apache.org/r1565143

http://secunia.com/advisories/60753

http://secunia.com/advisories/60475

http://secunia.com/advisories/59725

http://secunia.com/advisories/59500

http://secunia.com/advisories/59492

http://secunia.com/advisories/59399

http://secunia.com/advisories/59232

http://secunia.com/advisories/59187

http://secunia.com/advisories/59185

http://secunia.com/advisories/59184

http://secunia.com/advisories/59183

http://secunia.com/advisories/59041

http://secunia.com/advisories/59039

http://secunia.com/advisories/58976

http://secunia.com/advisories/58075

http://secunia.com/advisories/57915

http://seclists.org/fulldisclosure/2014/Dec/23

http://rhn.redhat.com/errata/RHSA-2014-0400.html

http://rhn.redhat.com/errata/RHSA-2014-0253.html

http://rhn.redhat.com/errata/RHSA-2014-0252.html

http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html

http://marc.info/?l=bugtraq&m=143136844732487&w=2

http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E

http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017

http://jvn.jp/en/jp/JVN14876762/index.html

http://advisories.mageia.org/MGASA-2014-0110.html

Details

Source: Mitre, NVD

Published: 2014-04-01

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical