Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:38.500Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0075

No data.

Status : Modified
Published: 2014-05-31T11:17:13.093
Modified: 2024-11-21T02:01:18.350
Link: CVE-2014-0075
