Korean
<< Back
VID 22927
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 9.0.16. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.16_security-9 advisory.
- The HTTP/2 implementation accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-0199)

* References:
https://svn.apache.org/viewvc?view=rev&rev=1852698 https://svn.apache.org/viewvc?view=rev&rev=1852699 https://svn.apache.org/viewvc?view=rev&rev=1852700 https://svn.apache.org/viewvc?view=rev&rev=1852701 https://svn.apache.org/viewvc?view=rev&rev=1852702 https://svn.apache.org/viewvc?view=rev&rev=1852703 https://svn.apache.org/viewvc?view=rev&rev=1852704 https://svn.apache.org/viewvc?view=rev&rev=1852705 https://svn.apache.org/viewvc?view=rev&rev=1852706 https://github.com/apache/tomcat/commit/a1cb1ac

* Platforms Affected:
Apache Tomcat Server versions 9.0.x prior to 9.0.16
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (9.0.16 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2019-0199 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)