From 1a2f0c90a9bcb90866a67c8cc897dfe4846ee883 Mon Sep 17 00:00:00 2001 From: Jason Unovitch Date: Sun, 26 Jun 2016 18:13:40 +0000 Subject: [PATCH] Document remote denial of service via FileUpload component in Tomcat PR: 209669 [1] Reported by: Geoffroy Desvernay [1] Reported by: Roger Marquis Security: CVE-2016-3092 Security: https://vuxml.FreeBSD.org/freebsd/cbceeb49-3bc7-11e6-8e82-002590263bf5.html --- security/vuxml/vuln.xml | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ea5a291d9b35..5dce74b6ca1c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + tomcat -- remote DoS in the Apache Commons FileUpload component + + + tomcat7 + 7.0.70 + + + tomcat8 + 8.0.36 + + + + +

Mark Thomas reports:

+
+

CVE-2016-3092 is a denial of service vulnerability that has been + corrected in the Apache Commons FileUpload component. It occurred + when the length of the multipart boundary was just below the size of + the buffer (4096 bytes) used to read the uploaded file. This caused + the file upload process to take several orders of magnitude longer + than if the boundary length was the typical tens of bytes.

+
+ +
+ + CVE-2016-3092 + ports/209669 + http://tomcat.apache.org/security-7.html + http://tomcat.apache.org/security-8.html + http://mail-archives.apache.org/mod_mbox/tomcat-announce/201606.mbox/%3C6223ece6-2b41-ef4f-22f9-d3481e492832%40apache.org%3E + + + 2016-06-20 + 2016-06-26 + +
+ wordpress -- multiple vulnerabilities