| Summary | Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts. |
|---|---|
| Publication Date | June 8, 2015, 8:59 a.m. |
| Registration Date | Jan. 26, 2021, 3:04 p.m. |
| Last Update | Nov. 21, 2024, 11:01 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.8 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:virtualization:4.71:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:virtualization:4.63:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:virtualization:5.1:*:*:*:*:*:*:* | |||||
| Title | Apache Tomcat におけるサービス運用妨害 (DoS) の脆弱性 |
|---|---|
| Summary | Apache Tomcat は、リクエストボディ全体の読み出しが終わる前に HTTP レスポンスが発生するケースを適切に処理しないため、サービス運用妨害 (メモリ消費) 状態にされる脆弱性が存在します。 |
| Possible impacts | 第三者により、一連の中断されたアップロードの試行を介して、サービス運用妨害 (メモリ消費) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 24, 2014, midnight |
| Registration Date | June 9, 2015, 4:52 p.m. |
| Last Update | Sept. 7, 2016, 4:52 p.m. |
| Apache Software Foundation |
| Apache Tomcat 6.0.44 未満の 6.x |
| Apache Tomcat 7.0.55 未満の 7.x |
| Apache Tomcat 8.0.9 未満の 8.x |
| オラクル |
| Oracle Virtualization の Oracle Secure Global Desktop 4.63 |
| Oracle Virtualization の Oracle Secure Global Desktop 4.71 |
| Oracle Virtualization の Oracle Secure Global Desktop 5.1 |
| ヒューレット・パッカード・エンタープライズ |
| HP-UX Tomcat-based Servlet Engine |
| OpenVMS CSWS_JAVA |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2015年06月09日] 掲載 [2015年07月29日] 影響を受けるシステム:ベンダ情報の追加に伴い内容を更新 ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - July 2015) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - July 2015 Risk Matrices) を追加 ベンダ情報:オラクル (July 2015 Critical Patch Update Released) を追加 [2015年10月30日] ベンダ情報:オラクル (Oracle Solaris Third Party Bulletin - October 2015) を追加 [2016年09月07日] 影響を受けるシステム:ベンダ情報の追加に伴い内容を更新 ベンダ情報:Apache Software Foundation ([SECURITY] CVE-2014-0230: Apache Tomcat DoS) を追加 ベンダ情報:ヒューレット・パッカード・エンタープライズ (HPSBUX03561) を追加 ベンダ情報:ヒューレット・パッカード・エンタープライズ (HPSBOV03503) を追加 ベンダ情報:レッドハット (RHSA-2016:0595) を追加 ベンダ情報:レッドハット (RHSA-2016:0596) を追加 ベンダ情報:レッドハット (RHSA-2016:0597) を追加 ベンダ情報:レッドハット (RHSA-2016:0598) を追加 ベンダ情報:レッドハット (RHSA-2016:0599) を追加 |
Feb. 17, 2018, 10:37 a.m. |