You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@tomcat.apache.org by André Warnier <aw...@ice-sa.com> on 2015/05/12 13:26:39 UTC

Re: Tomcat Vulnerabilities for 6.x and 7.x version

Mittal, Paran (Infosys) wrote:
> Hi Team,
> 
> We need to understand the fix for tomcat Vulnerabilities for 6.0.29 and 7.0 version.
> We came across a CVE Reference:   CVE-2014-0230 which says
> "When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited Denial of Service as Tomcat would never close the connection and a processing thread would remain allocated to the connection"
> 
> Could you please provide us with the Fix or patch for the same as we could not found same on the apache tomcat site.
> 
Hi.
I think that this topic has already been extensively discussed on the list.
Please check if this does not already answer your question, if any :

http://marc.info/?t=143086654700005&r=1&w=2


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
For additional commands, e-mail: users-help@tomcat.apache.org