VID |
22927 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 9.0.16. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.16_security-9 advisory. - The HTTP/2 implementation accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199)
* References: https://svn.apache.org/viewvc?view=rev&rev=1852698 https://svn.apache.org/viewvc?view=rev&rev=1852699 https://svn.apache.org/viewvc?view=rev&rev=1852700 https://svn.apache.org/viewvc?view=rev&rev=1852701 https://svn.apache.org/viewvc?view=rev&rev=1852702 https://svn.apache.org/viewvc?view=rev&rev=1852703 https://svn.apache.org/viewvc?view=rev&rev=1852704 https://svn.apache.org/viewvc?view=rev&rev=1852705 https://svn.apache.org/viewvc?view=rev&rev=1852706 https://github.com/apache/tomcat/commit/a1cb1ac
* Platforms Affected: Apache Tomcat Server versions 9.0.x prior to 9.0.16 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (9.0.16 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2019-0199 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|