Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2014-0050
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:commons_fileupload:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://jvn.jp/en/jp/JVN14876762/index.html
- http://tomcat.apache.org/security-8.html
- http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apa
- https://bugzilla.redhat.com/show_bug.cgi?id=1062337
- http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
- http://svn.apache.org/r1565143
- http://tomcat.apache.org/security-7.html
- http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-b
- http://rhn.redhat.com/errata/RHSA-2014-0400.html
- http://secunia.com/advisories/57915
- http://www-01.ibm.com/support/docview.wss?uid=swg21676410
- http://secunia.com/advisories/58976
- http://secunia.com/advisories/59232
- http://secunia.com/advisories/59183
- http://secunia.com/advisories/59500
- http://www-01.ibm.com/support/docview.wss?uid=swg21676401
- http://secunia.com/advisories/58075
- http://www-01.ibm.com/support/docview.wss?uid=swg21677724
- http://www-01.ibm.com/support/docview.wss?uid=swg21676853
- http://secunia.com/advisories/59187
- http://www-01.ibm.com/support/docview.wss?uid=swg21675432
- http://secunia.com/advisories/59041
- http://secunia.com/advisories/59185
- http://secunia.com/advisories/59492
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
- http://www.securityfocus.com/bid/65400
- http://secunia.com/advisories/59039
- http://secunia.com/advisories/59725
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
- http://secunia.com/advisories/59399
- http://www-01.ibm.com/support/docview.wss?uid=swg21676656
- http://www-01.ibm.com/support/docview.wss?uid=swg21676403
- http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
- http://secunia.com/advisories/59184
- http://www-01.ibm.com/support/docview.wss?uid=swg21676405
- http://www.vmware.com/security/advisories/VMSA-2014-0007.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733
- http://secunia.com/advisories/60475
- http://secunia.com/advisories/60753
- http://www-01.ibm.com/support/docview.wss?uid=swg21677691
- http://www-01.ibm.com/support/docview.wss?uid=swg21681214
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
- http://advisories.mageia.org/MGASA-2014-0110.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21676091
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21669554
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://marc.info/?l=bugtraq&m=143136844732487&w=2
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
- http://www.vmware.com/security/advisories/VMSA-2014-0008.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.ubuntu.com/usn/USN-2130-1
- http://www.debian.org/security/2014/dsa-2856
- http://rhn.redhat.com/errata/RHSA-2014-0253.html
- http://rhn.redhat.com/errata/RHSA-2014-0252.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/archive/1/532549/100/0/threaded
- https://security.gentoo.org/glsa/202107-39