{
  "threat_severity" : "Moderate",
  "public_date" : "2014-05-27T00:00:00Z",
  "bugzilla" : {
    "description" : "Tomcat/JBossWeb: Request smuggling via malicious content length header",
    "id" : "1102030",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1102030"
  },
  "cvss" : {
    "cvss_base_score" : "5.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-190->CWE-444",
  "details" : [ "Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.", "It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly." ],
  "statement" : "This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for  Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2014-07-09T00:00:00Z",
    "advisory" : "RHSA-2014:0865",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "tomcat6-0:6.0.24-72.el6_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2014-07-02T00:00:00Z",
    "advisory" : "RHSA-2014:0827",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "tomcat-0:7.0.42-6.el7_0"
  }, {
    "product_name" : "Red Hat JBoss BPMS 6.0",
    "release_date" : "2015-02-17T00:00:00Z",
    "advisory" : "RHSA-2015:0234",
    "cpe" : "cpe:/a:redhat:jboss_bpms:6.0",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss BRMS 6.0",
    "release_date" : "2015-02-17T00:00:00Z",
    "advisory" : "RHSA-2015:0235",
    "cpe" : "cpe:/a:redhat:jboss_brms:6.0",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 6.3",
    "release_date" : "2014-07-16T00:00:00Z",
    "advisory" : "RHSA-2014:0895",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:6.3.0",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss Data Virtualization 6.0",
    "release_date" : "2015-03-31T00:00:00Z",
    "advisory" : "RHSA-2015:0765",
    "cpe" : "cpe:/a:redhat:jboss_data_virtualization:6.0",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss Data Virtualization 6.1",
    "release_date" : "2015-03-11T00:00:00Z",
    "advisory" : "RHSA-2015:0675",
    "cpe" : "cpe:/a:redhat:jboss_data_virtualization:6.1"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.2",
    "release_date" : "2014-07-07T00:00:00Z",
    "advisory" : "RHSA-2014:0842",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6.2.4"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5",
    "release_date" : "2014-07-07T00:00:00Z",
    "advisory" : "RHSA-2014:0843",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
    "package" : "jbossweb-0:7.3.2-4.Final_redhat_3.1.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6",
    "release_date" : "2014-07-07T00:00:00Z",
    "advisory" : "RHSA-2014:0843",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
    "package" : "jbossweb-0:7.3.2-4.Final_redhat_3.1.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 5",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0834",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
    "package" : "tomcat6-0:6.0.37-20_patch_04.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 5",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0835",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
    "package" : "tomcat7-0:7.0.40-14_patch_03.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0834",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat6-0:6.0.37-29_patch_05.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0835",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat7-0:7.0.40-11_patch_03.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Fuse Service Works 6.0",
    "release_date" : "2015-03-24T00:00:00Z",
    "advisory" : "RHSA-2015:0720",
    "cpe" : "cpe:/a:redhat:jboss_fuse_service_works:6.0",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3.2",
    "release_date" : "2014-09-03T00:00:00Z",
    "advisory" : "RHSA-2014:1149",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3.2.3"
  }, {
    "product_name" : "Red Hat JBoss Portal 6.2",
    "release_date" : "2015-05-14T00:00:00Z",
    "advisory" : "RHSA-2015:1009",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_portal_platform:6.2",
    "package" : "jbossweb"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.0",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0833",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.0",
    "package" : "tomcat6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.0",
    "release_date" : "2014-07-03T00:00:00Z",
    "advisory" : "RHSA-2014:0836",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.0",
    "package" : "tomcat7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "tomcat5",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 5",
    "fix_state" : "Will not fix",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1",
    "fix_state" : "Will not fix",
    "package_name" : "tomcat5",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1",
    "fix_state" : "Will not fix",
    "package_name" : "tomcat6",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3",
    "fix_state" : "Affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-0099\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-0099" ],
  "name" : "CVE-2014-0099",
  "csaw" : false
}