Lucene search

K
redhatcveRedhat.comRH:CVE-2024-24549
HistoryMar 14, 2024 - 9:40 p.m.

CVE-2024-24549

2024-03-1421:40:09
redhat.com
access.redhat.com
53
tomcat package
http/2 request
vulnerability
stream reset
delay
attacks
header manipulation
resource exhaustion
red hat product security
mitigation.

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.1%

A vulnerability was found in the Tomcat package due to its handling of HTTP/2 requests. Specifically, when an HTTP/2 request surpasses the predetermined limits for headers configured within the server, the associated HTTP/2 stream isn’t reset immediately. Instead, the reset action occurs only after all the headers within the request have been processed. This lapse in resetting the stream exposes the system to potential risks, as it allows malicious actors to exploit the delay in stream reset to carry out various attacks, such as header manipulation or resource exhaustion.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.