Check Point Reference: | CPAI-2014-1059 |
Date Published: | 5 Mar 2014 |
Severity: | High |
Last Updated: | Thursday 13 March, 2014 |
Source: | Apache |
Industry Reference: | CVE-2013-4322 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Apache Software Foundation Tomcat 6.0.0 prior to 6.0.39 Apache Software Foundation Tomcat 7.0.0 prior to 7.0.50 Apache Software Foundation Tomcat 8.0.0-RC1 to 8.0.0-RC5 |
Vulnerability Description | A denial of service vulnerability has been reported in Apache Tomcat. This vulnerability is due to Tomcat not discarding any extensions included in very long Chunked-transfer requests, even if they were not processed. A remote attacker could exploit this vulnerability by sending a large amount of data to the server causing it to use up excessive resources. |
This protection will detect and block attempts to exploit this vulnerability.Note: This protection is supported from version R75.40VS and above and cannot be enforced by previous IPS gateway versions.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Apache Server Protection Violation.
Attack Information: Apache Tomcat Large Chunked Transfer Denial of Service