Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| org.apache.tomcat:tomcat(Maven) | 0 | 6.0.40 | N/A |
| org.apache.tomcat:tomcat(Maven) | 7.0.0 | 7.0.53 | N/A |
| org.apache.tomcat:tomcat(Maven) | 8.0.0 | 8.0.4 | N/A |
| org.apache.tomcat:tomcat-coyote(Maven) | 0 | 6.0.40 | N/A |
| org.apache.tomcat:tomcat-coyote(Maven) | 7.0.0 | 7.0.53 | N/A |
| org.apache.tomcat:tomcat-coyote(Maven) | 8.0.0 | 8.0.4 | N/A |
CVSS Metrics