Apache Tomcat Connection Swallow Denial Of Service

Discussion in 'News Aggregator' started by Packet Storm, 6 May 2015.

  1. Packet Storm

    Packet Storm Guest

    When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited denial of service as Tomcat would never close the connection and a processing thread would remain allocated to the connection. Versions affected include Apache Tomcat 8.0.0-RC1 to 8.0.8, 7.0.0 to 7.0.54, and 6.0.0 to 6.0.43.

    Continue reading...
     

Share This Page

Loading...