VID |
210271 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 8.5.99. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_8.5.99_security-8 advisory.
- Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672) - Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)
* References: https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591 https://github.com/apache/tomcat/commit/0cac540a882220231ba7a82330483cbd5f6b1f96 https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.99
* Platforms Affected: Apache Tomcat Server versions 8.5.x prior to 8.5.99 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (8.5.99 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2024-23672,CVE-2024-24549 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|