FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

tomcat -- multiple vulnerabilities

Affected packages
tomcat < 6.0.44
tomcat7 < 7.0.55
tomcat8 < 8.0.9
hadoop2 <= 2.6.0
oozie <= 4.1.0

Details

VuXML ID 25e0593d-13c0-11e5-9afb-3c970e169bc2
Discovery 2015-05-12
Entry 2015-06-16
Modified 2017-03-18

Apache Software Foundation reports:

Low: Denial of Service CVE-2014-0230

When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited Denial of Service as Tomcat would never close the connection and a processing thread would remain allocated to the connection.

Moderate: Security Manager bypass CVE-2014-7810

Malicious web applications could use expression language to bypass the protections of a Security Manager as expressions were evaluated within a privileged code section.

References

CVE Name CVE-2014-0230
CVE Name CVE-2014-7810
URL https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44