VID |
210273 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 10.1.19. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.19_security-10
- Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672) - Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)
* References: https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501 https://github.com/apache/tomcat/commit/d07c82194edb69d99b438828fe2cbfadbb207843 https://tomcat.apache.org/security-0.html#Fixed_in_Apache_Tomcat_10.1.19
* Platforms Affected: Apache Tomcat Server versions 10.1.x prior to 10.1.19 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (10.1.19 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2024-23672,CVE-2024-24549 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|