CVE-2014-0230

EUVD-2022-4851
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
Affected Products (NVD)
VendorProductVersion
apachetomcat
6.0.0
apachetomcat
6.0.0:alpha
apachetomcat
6.0.1
apachetomcat
6.0.1:alpha
apachetomcat
6.0.2
apachetomcat
6.0.2:alpha
apachetomcat
6.0.2:beta
apachetomcat
6.0.3
apachetomcat
6.0.4
apachetomcat
6.0.4:alpha
apachetomcat
6.0.5
apachetomcat
6.0.6
apachetomcat
6.0.6:alpha
apachetomcat
6.0.7
apachetomcat
6.0.7:alpha
apachetomcat
6.0.7:beta
apachetomcat
6.0.8
apachetomcat
6.0.8:alpha
apachetomcat
6.0.9
apachetomcat
6.0.9:beta
apachetomcat
6.0.10
apachetomcat
6.0.11
apachetomcat
6.0.12
apachetomcat
6.0.13
apachetomcat
6.0.14
apachetomcat
6.0.15
apachetomcat
6.0.16
apachetomcat
6.0.17
apachetomcat
6.0.18
apachetomcat
6.0.19
apachetomcat
6.0.20
apachetomcat
6.0.24
apachetomcat
6.0.26
apachetomcat
6.0.27
apachetomcat
6.0.28
apachetomcat
6.0.29
apachetomcat
6.0.30
apachetomcat
6.0.31
apachetomcat
6.0.32
apachetomcat
6.0.33
apachetomcat
6.0.35
apachetomcat
6.0.36
apachetomcat
6.0.37
apachetomcat
6.0.39
apachetomcat
6.0.41
apachetomcat
6.0.43
apachetomcat
7.0.0
apachetomcat
7.0.0:beta
apachetomcat
7.0.1
apachetomcat
7.0.2
apachetomcat
7.0.2:beta
apachetomcat
7.0.3
apachetomcat
7.0.4
apachetomcat
7.0.4:beta
apachetomcat
7.0.5
apachetomcat
7.0.6
apachetomcat
7.0.7
apachetomcat
7.0.8
apachetomcat
7.0.9
apachetomcat
7.0.10
apachetomcat
7.0.11
apachetomcat
7.0.12
apachetomcat
7.0.13
apachetomcat
7.0.14
apachetomcat
7.0.15
apachetomcat
7.0.16
apachetomcat
7.0.17
apachetomcat
7.0.18
apachetomcat
7.0.19
apachetomcat
7.0.20
apachetomcat
7.0.21
apachetomcat
7.0.22
apachetomcat
7.0.23
apachetomcat
7.0.24
apachetomcat
7.0.25
apachetomcat
7.0.26
apachetomcat
7.0.27
apachetomcat
7.0.28
apachetomcat
7.0.29
apachetomcat
7.0.30
apachetomcat
7.0.31
apachetomcat
7.0.32
apachetomcat
7.0.33
apachetomcat
7.0.34
apachetomcat
7.0.35
apachetomcat
7.0.36
apachetomcat
7.0.37
apachetomcat
7.0.38
apachetomcat
7.0.39
apachetomcat
7.0.40
apachetomcat
7.0.41
apachetomcat
7.0.42
apachetomcat
7.0.43
apachetomcat
7.0.44
apachetomcat
7.0.45
apachetomcat
7.0.46
apachetomcat
7.0.47
apachetomcat
7.0.48
apachetomcat
7.0.49
apachetomcat
7.0.50
apachetomcat
7.0.52
apachetomcat
7.0.53
apachetomcat
7.0.54
apachetomcat
8.0.0:rc1
apachetomcat
8.0.0:rc10
apachetomcat
8.0.0:rc2
apachetomcat
8.0.0:rc5
apachetomcat
8.0.1
apachetomcat
8.0.3
apachetomcat
8.0.5
apachetomcat
8.0.8
oraclevirtualization
4.63
oraclevirtualization
4.71
oraclevirtualization
5.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat6
artful
dne
bionic
dne
lucid
ignored
precise
Fixed 6.0.35-1ubuntu3.6
released
trusty
Fixed 6.0.39-1ubuntu0.1
released
utopic
ignored
vivid
ignored
wily
ignored
xenial
Fixed 6.0.45+dfsg-1
released
yakkety
dne
zesty
dne
tomcat7
artful
not-affected
bionic
not-affected
lucid
dne
precise
ignored
trusty
Fixed 7.0.52-1ubuntu0.3
released
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
tomcat8
artful
not-affected
bionic
not-affected
lucid
dne
precise
dne
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
Common Weakness Enumeration
References