CVE-2013-4286
Published: 26 February 2014
Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
Priority
Status
Package | Release | Status |
---|---|---|
tomcat6 Launchpad, Ubuntu, Debian |
lucid |
Released
(6.0.24-2ubuntu1.15)
|
precise |
Released
(6.0.35-1ubuntu3.4)
|
|
quantal |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(6.0.39-1)
|
|
upstream |
Released
(6.0.39)
|
|
utopic |
Not vulnerable
(6.0.39-1)
|
|
vivid |
Not vulnerable
(6.0.39-1)
|
|
wily |
Not vulnerable
(6.0.39-1)
|
|
xenial |
Not vulnerable
(6.0.39-1)
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1552565 |
||
tomcat7 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Ignored
(end of life)
|
|
quantal |
Released
(7.0.30-0ubuntu1.3)
|
|
saucy |
Released
(7.0.42-1ubuntu0.1)
|
|
trusty |
Not vulnerable
(7.0.52-1)
|
|
upstream |
Released
(7.0.47)
|
|
utopic |
Not vulnerable
(7.0.52-1)
|
|
vivid |
Not vulnerable
(7.0.52-1)
|
|
wily |
Not vulnerable
(7.0.52-1)
|
|
xenial |
Not vulnerable
(7.0.52-1)
|
|
yakkety |
Not vulnerable
(7.0.52-1)
|
|
zesty |
Not vulnerable
(7.0.52-1)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1518197 (backport) upstream: http://svn.apache.org/viewvc?view=revision&revision=1521854 |