Korean
<< Back
VID 22928
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 9.0.20. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.20_security-9 advisory.
- The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write. By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. (CVE-2019-10072)

* References:
https://github.com/apache/tomcat/commit/7f748eb https://github.com/apache/tomcat/commit/ada725a https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.20

* Platforms Affected:
Apache Tomcat Server versions 9.0.x prior to 9.0.20
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (9.0.20 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2019-0199,CVE-2019-10072 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)