Korean
<< Back
VID 210274
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 11.0.0.M17. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_11.0.0-m17_security-11

- Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672)
- Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat.
When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)

* References:
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://github.com/apache/tomcat/commit/810f49d5ff6d64b704af85d5b8d0aab9ec3c83f5
https://tomcat.apache.org/security-1.html#Fixed_in_Apache_Tomcat_11.0.0-M17

* Platforms Affected:
Apache Tomcat Server versions 11.0.0.x prior to 11.0.0.M17
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (11.0.0.M17 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2024-23672,CVE-2024-24549 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)