Lucene search

K
githubGitHub Advisory DatabaseGHSA-WM9W-RJJ3-J356
HistoryJul 03, 2024 - 9:39 p.m.

Apache Tomcat - Denial of Service

2024-07-0321:39:44
CWE-400
CWE-755
GitHub Advisory Database
github.com
8
apache tomcat
denial of service
exceptional conditions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.

Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

Affected configurations

Vulners
Node
org.apache.tomcat\tomcatMatchcoyote
OR
org.apache.tomcat\tomcatMatchcoyote
OR
org.apache.tomcat\tomcatMatchcoyote
OR
org.apache.tomcat.embed\Matchtomcat-embed-core
OR
org.apache.tomcat.embed\Matchtomcat-embed-core
OR
org.apache.tomcat.embed\Matchtomcat-embed-core

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High