CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | tomcat10 | <= 10.1.6-1+deb12u2 | tomcat10_10.1.6-1+deb12u2_all.deb |
Debian | 999 | all | tomcat10 | < 10.1.25-1 | tomcat10_10.1.25-1_all.deb |
Debian | 13 | all | tomcat10 | < 10.1.25-1 | tomcat10_10.1.25-1_all.deb |
Debian | 12 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |
Debian | 11 | all | tomcat9 | <= 9.0.43-2~deb11u10 | tomcat9_9.0.43-2~deb11u10_all.deb |
Debian | 999 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |
Debian | 13 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |