Details
-
Type: Bug
-
Status: Closed
-
Priority: Major
-
Resolution: Fixed
-
Affects Version/s: 3.3, EE-3.3.0.GA
-
Fix Version/s: EE-3.3.0.GA_P02, 4.0
-
Component/s: ACE-Components, ICE-Components
-
Labels:None
-
Environment:ICEfaces, file upload
-
Assignee Priority:P1
Description
ICEfaces FileEntry makes use of an embedded copy of commons-fileupload, so is vulnerable to the following:
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
Two small changes to fileupload/MultipartStream.java and fileupload/FileUploadBase.java:
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/http/fileupload/MultipartStream.java?r1=1561650&r2=1565169&pathrev=1565169&diff_format=h
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/http/fileupload/FileUploadBase.java?r1=1561650&r2=1565169&pathrev=1565169&diff_format=h
Checkin comment:
"Fix CVE-2014-0050 DoS with malformed Content-Type header and multipart request processing."