CVE-2014-0099 : Detail

CVE-2014-0099

0.47%V3
Network
2014-05-31
08h00 +00:00
2020-02-13
15h09 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Apache>>Tomcat >> Version To (including) 6.0.39

Apache>>Tomcat >> Version 6

Apache>>Tomcat >> Version 6.0

Apache>>Tomcat >> Version 6.0.0

Apache>>Tomcat >> Version 6.0.0

Apache>>Tomcat >> Version 6.0.1

Apache>>Tomcat >> Version 6.0.1

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.3

Apache>>Tomcat >> Version 6.0.4

Apache>>Tomcat >> Version 6.0.4

Apache>>Tomcat >> Version 6.0.5

Apache>>Tomcat >> Version 6.0.6

Apache>>Tomcat >> Version 6.0.6

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.8

Apache>>Tomcat >> Version 6.0.8

Apache>>Tomcat >> Version 6.0.9

Apache>>Tomcat >> Version 6.0.9

Apache>>Tomcat >> Version 6.0.10

Apache>>Tomcat >> Version 6.0.11

Apache>>Tomcat >> Version 6.0.12

Apache>>Tomcat >> Version 6.0.13

Apache>>Tomcat >> Version 6.0.14

Apache>>Tomcat >> Version 6.0.15

Apache>>Tomcat >> Version 6.0.16

Apache>>Tomcat >> Version 6.0.17

Apache>>Tomcat >> Version 6.0.18

Apache>>Tomcat >> Version 6.0.19

Apache>>Tomcat >> Version 6.0.20

Apache>>Tomcat >> Version 6.0.24

Apache>>Tomcat >> Version 6.0.26

Apache>>Tomcat >> Version 6.0.27

Apache>>Tomcat >> Version 6.0.28

Apache>>Tomcat >> Version 6.0.29

Apache>>Tomcat >> Version 6.0.30

Apache>>Tomcat >> Version 6.0.31

Apache>>Tomcat >> Version 6.0.32

Apache>>Tomcat >> Version 6.0.33

Apache>>Tomcat >> Version 6.0.35

Apache>>Tomcat >> Version 6.0.36

Apache>>Tomcat >> Version 6.0.37

Configuraton 0

Apache>>Tomcat >> Version 8.0.0

Apache>>Tomcat >> Version 8.0.0

Apache>>Tomcat >> Version 8.0.0

Apache>>Tomcat >> Version 8.0.0

Apache>>Tomcat >> Version 8.0.1

Apache>>Tomcat >> Version 8.0.3

Configuraton 0

Apache>>Tomcat >> Version 7.0.0

Apache>>Tomcat >> Version 7.0.0

Apache>>Tomcat >> Version 7.0.1

Apache>>Tomcat >> Version 7.0.2

Apache>>Tomcat >> Version 7.0.2

Apache>>Tomcat >> Version 7.0.3

Apache>>Tomcat >> Version 7.0.4

Apache>>Tomcat >> Version 7.0.4

Apache>>Tomcat >> Version 7.0.5

Apache>>Tomcat >> Version 7.0.6

Apache>>Tomcat >> Version 7.0.7

Apache>>Tomcat >> Version 7.0.8

Apache>>Tomcat >> Version 7.0.9

Apache>>Tomcat >> Version 7.0.10

Apache>>Tomcat >> Version 7.0.11

Apache>>Tomcat >> Version 7.0.12

Apache>>Tomcat >> Version 7.0.13

Apache>>Tomcat >> Version 7.0.14

Apache>>Tomcat >> Version 7.0.15

Apache>>Tomcat >> Version 7.0.16

Apache>>Tomcat >> Version 7.0.17

Apache>>Tomcat >> Version 7.0.18

Apache>>Tomcat >> Version 7.0.19

Apache>>Tomcat >> Version 7.0.20

Apache>>Tomcat >> Version 7.0.21

Apache>>Tomcat >> Version 7.0.22

Apache>>Tomcat >> Version 7.0.23

Apache>>Tomcat >> Version 7.0.24

Apache>>Tomcat >> Version 7.0.25

Apache>>Tomcat >> Version 7.0.26

Apache>>Tomcat >> Version 7.0.27

Apache>>Tomcat >> Version 7.0.28

Apache>>Tomcat >> Version 7.0.29

Apache>>Tomcat >> Version 7.0.30

Apache>>Tomcat >> Version 7.0.31

Apache>>Tomcat >> Version 7.0.32

Apache>>Tomcat >> Version 7.0.33

Apache>>Tomcat >> Version 7.0.34

Apache>>Tomcat >> Version 7.0.35

Apache>>Tomcat >> Version 7.0.36

Apache>>Tomcat >> Version 7.0.37

Apache>>Tomcat >> Version 7.0.38

Apache>>Tomcat >> Version 7.0.39

Apache>>Tomcat >> Version 7.0.40

Apache>>Tomcat >> Version 7.0.41

Apache>>Tomcat >> Version 7.0.42

Apache>>Tomcat >> Version 7.0.43

Apache>>Tomcat >> Version 7.0.44

Apache>>Tomcat >> Version 7.0.45

Apache>>Tomcat >> Version 7.0.46

Apache>>Tomcat >> Version 7.0.47

Apache>>Tomcat >> Version 7.0.48

Apache>>Tomcat >> Version 7.0.49

Apache>>Tomcat >> Version 7.0.50

Apache>>Tomcat >> Version 7.0.52

References

http://secunia.com/advisories/59121
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2015-0765.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/59732
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/59835
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2015-0675.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
Tags : vendor-advisory, x_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2015-0720.html
Tags : vendor-advisory, x_refsource_REDHAT
http://seclists.org/fulldisclosure/2014/May/140
Tags : mailing-list, x_refsource_FULLDISC
http://secunia.com/advisories/59849
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/67668
Tags : vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2016/dsa-3530
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/59678
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141017844705317&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
Tags : vendor-advisory, x_refsource_MANDRIVA
http://marc.info/?l=bugtraq&m=141390017113542&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/59873
Tags : third-party-advisory, x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2014/Dec/23
Tags : mailing-list, x_refsource_FULLDISC
http://www.securitytracker.com/id/1030302
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=144498216801440&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141017844705317&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.debian.org/security/2016/dsa-3447
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/60729
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60793
Tags : third-party-advisory, x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2014/May/138
Tags : mailing-list, x_refsource_FULLDISC