CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
Vendor | Product | Version | CPE |
---|---|---|---|
org.apache.tomcat\ | tomcat | coyote | cpe:2.3:a:org.apache.tomcat\:tomcat:coyote:*:*:*:*:*:*:*:* |
* | org.apache.tomcat.embed\ | tomcat-embed-core | cpe:2.3:a:*:org.apache.tomcat.embed\:tomcat-embed-core:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-wm9w-rjj3-j356
github.com/apache/tomcat/commit/2344a4c0d03e307ba6b8ab6dc8b894cc8bac63f2
github.com/apache/tomcat/commit/2afae300c9ac9c0e516e2e9de580847d925365c3
github.com/apache/tomcat/commit/9fec9a82887853402833a80b584e3762c7423f5f
lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l
nvd.nist.gov/vuln/detail/CVE-2024-34750
tomcat.apache.org/security-10.html
tomcat.apache.org/security-11.html
tomcat.apache.org/security-9.html