CVE-2014-0050
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
Evaluator Description
The previous CVSS assessment ( Base Score: 5.0 - AV:N/AC:L/AU:N/C:N/I:N/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has been updated to reflect the impact to Oracle products per Oracle Critical Patch Update Advisory - October 2015 . Other products listed as vulnerable may or may not be similarly impacted.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://advisories.mageia.org/MGASA-2014-0110.html
CVE, Inc., Red Hat
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html
CVE, Inc., Red Hat
Exploit
http://jvn.jp/en/jp/JVN14876762/index.html
CVE, Inc., Red Hat
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
CVE, Inc., Red Hat
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=143136844732487&w=2
CVE, Inc., Red Hat
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2014-0252.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2014-0253.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2014-0400.html
CVE, Inc., Red Hat
http://seclists.org/fulldisclosure/2014/Dec/23
CVE, Inc., Red Hat
http://secunia.com/advisories/57915
CVE, Inc., Red Hat
http://secunia.com/advisories/58075
CVE, Inc., Red Hat
http://secunia.com/advisories/58976
CVE, Inc., Red Hat
http://secunia.com/advisories/59039
CVE, Inc., Red Hat
http://secunia.com/advisories/59041
CVE, Inc., Red Hat
http://secunia.com/advisories/59183
CVE, Inc., Red Hat
http://secunia.com/advisories/59184
CVE, Inc., Red Hat
http://secunia.com/advisories/59185
CVE, Inc., Red Hat
http://secunia.com/advisories/59187
CVE, Inc., Red Hat
http://secunia.com/advisories/59232
CVE, Inc., Red Hat
http://secunia.com/advisories/59399
CVE, Inc., Red Hat
http://secunia.com/advisories/59492
CVE, Inc., Red Hat
http://secunia.com/advisories/59500
CVE, Inc., Red Hat
http://secunia.com/advisories/59725
CVE, Inc., Red Hat
http://secunia.com/advisories/60475
CVE, Inc., Red Hat
http://secunia.com/advisories/60753
CVE, Inc., Red Hat
http://svn.apache.org/r1565143
CVE, Inc., Red Hat
Patch
http://tomcat.apache.org/security-7.html
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://tomcat.apache.org/security-8.html
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
CVE, Inc., Red Hat
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
CVE, Inc., Red Hat
http://www.debian.org/security/2014/dsa-2856
CVE, Inc., Red Hat
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
CVE, Inc., Red Hat
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
CVE, Inc., Red Hat
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
CVE, Inc., Red Hat
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/532549/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/534161/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/65400
CVE, Inc., Red Hat
http://www.ubuntu.com/usn/USN-2130-1
CVE, Inc., Red Hat
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
CVE, Inc., Red Hat
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
CVE, Inc., Red Hat
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
CVE, Inc., Red Hat
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
CVE, Inc., Red Hat
https://security.gentoo.org/glsa/202107-39
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-264
Permissions, Privileges, and Access Controls
NIST  
Change History
26 change records found show changes
CVE Modified by CVE 11/20/2024 9:01:15 PM
Action
Type
Old Value
New Value
Added
Reference
http://advisories.mageia.org/MGASA-2014-0110.html
Added
Reference
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html
Added
Reference
http://jvn.jp/en/jp/JVN14876762/index.html
Added
Reference
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
Added
Reference
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E
Added
Reference
http://marc.info/?l=bugtraq&m=143136844732487&w=2
Added
Reference
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2014-0252.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2014-0253.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2014-0400.html
Added
Reference
http://seclists.org/fulldisclosure/2014/Dec/23
Added
Reference
http://secunia.com/advisories/57915
Added
Reference
http://secunia.com/advisories/58075
Added
Reference
http://secunia.com/advisories/58976
Added
Reference
http://secunia.com/advisories/59039
Added
Reference
http://secunia.com/advisories/59041
Added
Reference
http://secunia.com/advisories/59183
Added
Reference
http://secunia.com/advisories/59184
Added
Reference
http://secunia.com/advisories/59185
Added
Reference
http://secunia.com/advisories/59187
Added
Reference
http://secunia.com/advisories/59232
Added
Reference
http://secunia.com/advisories/59399
Added
Reference
http://secunia.com/advisories/59492
Added
Reference
http://secunia.com/advisories/59500
Added
Reference
http://secunia.com/advisories/59725
Added
Reference
http://secunia.com/advisories/60475
Added
Reference
http://secunia.com/advisories/60753
Added
Reference
http://svn.apache.org/r1565143
Added
Reference
http://tomcat.apache.org/security-7.html
Added
Reference
http://tomcat.apache.org/security-8.html
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
Added
Reference
http://www.debian.org/security/2014/dsa-2856
Added
Reference
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
Added
Reference
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
Added
Reference
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
Added
Reference
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Added
Reference
http://www.securityfocus.com/archive/1/532549/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/534161/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/65400
Added
Reference
http://www.ubuntu.com/usn/USN-2130-1
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Added
Reference
https://security.gentoo.org/glsa/202107-39
CVE Modified by Red Hat, Inc. 5/13/2024 11:06:11 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 11/06/2023 9:18:06 PM
Action
Type
Old Value
New Value
Added
Reference
Red Hat, Inc. http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E [No types assigned]
Removed
Reference
Red Hat, Inc. http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%[email protected] %3E
CVE Modified by Red Hat, Inc. 7/17/2021 4:15:07 AM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/202107-39 [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/09/2018 3:35:09 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/532549/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/534161/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/532549/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/534161/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/15/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
http://rhn.redhat.com/errata/RHSA-2014-0252.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2014-0253.html [No Types Assigned]
Added
Reference
http://www.debian.org/security/2014/dsa-2856 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-2130-1 [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/19/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/16/2017 9:59:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/19/2017 9:59:02 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/06/2017 9:59:14 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2014-0008.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/04/2016 9:59:03 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
CVE Modified by Red Hat, Inc. 10/25/2016 9:59:21 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
CVE Modified by Red Hat, Inc. 8/22/2016 10:06:34 PM
Action
Type
Old Value
New Value
Added
Reference
http://marc.info/?l=bugtraq&m=143136844732487&w=2
CVE Modified by Red Hat, Inc. 6/16/2016 9:59:43 PM
Action
Type
Old Value
New Value
Removed
Reference
http://packetstormsecurity.com/files/131271/VMware-Security-Advisory-2015-0003.html
Removed
Reference
http://seclists.org/fulldisclosure/2015/Apr/5
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/535181/100/0/threaded
Modified Analysis by NIST 6/01/2016 10:25:42 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Record truncated, showing 2048 of 4365 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
Record truncated, showing 2048 of 4365 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 4/06/2016 9:59:04 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Removed
Reference
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
CVE Modified by Red Hat, Inc. 1/21/2016 9:59:12 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Modified Analysis by NIST 11/05/2015 2:10:02 PM
Action
Type
Old Value
New Value
Changed
CVSS V2
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Changed
CPE Configuration
Record truncated, showing 2048 of 3803 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
Record truncated, showing 2048 of 4365 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
*cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
Added
Evaluator Description
The previous CVSS assessment ( Base Score: 5.0 - AV:N/AC:L/AU:N/C:N/I:N/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has been updated to reflect the impact to Oracle products per <a href=http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html> Oracle Critical Patch Update Advisory - October 2015 </a>. Other products listed as vulnerable may or may not be similarly impacted.
CVE Modified by Red Hat, Inc. 10/22/2015 9:59:17 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
CVE Modified by Red Hat, Inc. 5/15/2015 9:59:14 PM
Action
Type
Old Value
New Value
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
CVE Modified by Red Hat, Inc. 4/16/2015 9:59:04 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
CVE Modified by Red Hat, Inc. 4/14/2015 9:59:54 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/131271/VMware-Security-Advisory-2015-0003.html
Added
Reference
http://seclists.org/fulldisclosure/2015/Apr/5
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/535181/100/0/threaded
CVE Modified by Red Hat, Inc. 4/01/2015 9:59:10 PM
Action
Type
Old Value
New Value
Added
Reference
http://advisories.mageia.org/MGASA-2014-0110.html
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
CVE Modified by Red Hat, Inc. 1/22/2015 9:00:05 AM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
CVE Modified by Red Hat, Inc. 12/11/2014 10:00:15 PM
Action
Type
Old Value
New Value
Added
Reference
http://seclists.org/fulldisclosure/2014/Dec/23
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/534161/100/0/threaded
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Initial CVE Analysis 4/01/2014 6:01:08 AM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2014-0050 NVD
Published Date: 04/01/2014 NVD
Last Modified: 04/12/2025
Source: Red Hat, Inc.