CVE Details

Release Date:2014-05-27


It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly.

See more information about CVE-2014-0099 from MITRE CVE dictionary and NIST NVD

CVSS v2.0 metrics

NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.8 Base Metrics: AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector: Network Attack Complexity: Medium
Authentication: None required Confidentiality Impact: Partial
Integrity Impact: Partial Availability Impact: None

Errata information

PlatformErrataRelease Date
Oracle Linux version 6 (tomcat6)ELSA-2014-08652014-07-09
Oracle Linux version 7 (tomcat)ELSA-2014-08272014-07-23

This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team