Lucene search

K
cveApacheCVE-2021-30639
HistoryJul 12, 2021 - 3:15 p.m.

CVE-2021-30639

2021-07-1215:15:08
CWE-755
apache
web.nvd.nist.gov
166
19
apache tomcat
vulnerability
remote
dos
cve-2021-30639

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.013

Percentile

86.2%

A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.

Affected configurations

Nvd
Vulners
Node
apachetomcatMatch8.5.64
OR
apachetomcatMatch9.0.44
OR
apachetomcatMatch10.0.3
OR
apachetomcatMatch10.0.4
Node
mcafeeepolicy_orchestratorRange<5.10.0
OR
mcafeeepolicy_orchestratorMatch5.10.0-
OR
mcafeeepolicy_orchestratorMatch5.10.0update_1
OR
mcafeeepolicy_orchestratorMatch5.10.0update_10
OR
mcafeeepolicy_orchestratorMatch5.10.0update_2
OR
mcafeeepolicy_orchestratorMatch5.10.0update_3
OR
mcafeeepolicy_orchestratorMatch5.10.0update_4
OR
mcafeeepolicy_orchestratorMatch5.10.0update_5
OR
mcafeeepolicy_orchestratorMatch5.10.0update_6
OR
mcafeeepolicy_orchestratorMatch5.10.0update_7
OR
mcafeeepolicy_orchestratorMatch5.10.0update_8
OR
mcafeeepolicy_orchestratorMatch5.10.0update_9
Node
oraclebig_data_spatial_and_graphRange<23.1
VendorProductVersionCPE
apachetomcat8.5.64cpe:2.3:a:apache:tomcat:8.5.64:*:*:*:*:*:*:*
apachetomcat9.0.44cpe:2.3:a:apache:tomcat:9.0.44:*:*:*:*:*:*:*
apachetomcat10.0.3cpe:2.3:a:apache:tomcat:10.0.3:*:*:*:*:*:*:*
apachetomcat10.0.4cpe:2.3:a:apache:tomcat:10.0.4:*:*:*:*:*:*:*
mcafeeepolicy_orchestrator*cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
mcafeeepolicy_orchestrator5.10.0cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
mcafeeepolicy_orchestrator5.10.0cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
mcafeeepolicy_orchestrator5.10.0cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*
mcafeeepolicy_orchestrator5.10.0cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
mcafeeepolicy_orchestrator5.10.0cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
Rows per page:
1-10 of 171

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "Apache Tomcat 10 10.0.3 to 10.0.4"
      },
      {
        "status": "affected",
        "version": "Apache Tomcat 9 9.0.44"
      },
      {
        "status": "affected",
        "version": "Apache Tomcat 8.5 8.5.64"
      }
    ]
  }
]

Social References

More

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.013

Percentile

86.2%