Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for tomcat7 (ALAS-2014-312) (CVE-2014-0050)

Back to Search

Amazon Linux AMI: Security patch for tomcat7 (ALAS-2014-312) (CVE-2014-0050)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/01/2014
Created
07/25/2018
Added
04/08/2014
Modified
09/01/2017

Description

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

Solution(s)

  • amazon-linux-upgrade-tomcat7
  • amazon-linux-upgrade-tomcat7-admin-webapps
  • amazon-linux-upgrade-tomcat7-docs-webapp
  • amazon-linux-upgrade-tomcat7-el-2-2-api
  • amazon-linux-upgrade-tomcat7-javadoc
  • amazon-linux-upgrade-tomcat7-jsp-2-2-api
  • amazon-linux-upgrade-tomcat7-lib
  • amazon-linux-upgrade-tomcat7-servlet-3-0-api
  • amazon-linux-upgrade-tomcat7-webapps

References

  • amazon-linux-upgrade-tomcat7
  • amazon-linux-upgrade-tomcat7-admin-webapps
  • amazon-linux-upgrade-tomcat7-docs-webapp
  • amazon-linux-upgrade-tomcat7-el-2-2-api
  • amazon-linux-upgrade-tomcat7-javadoc
  • amazon-linux-upgrade-tomcat7-jsp-2-2-api
  • amazon-linux-upgrade-tomcat7-lib
  • amazon-linux-upgrade-tomcat7-servlet-3-0-api
  • amazon-linux-upgrade-tomcat7-webapps

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;