VID |
22945 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 9.0.36. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.36_security-9 advisory.
- A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. (CVE-2020-11996)
* References: https://github.com/apache/tomcat/commit/9a0231683a77e2957cea0fdee88b193b30b0c976 https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.36
* Platforms Affected: Apache Tomcat Server versions 9.0.x prior to 9.0.36 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (9.0.36 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2020-11996 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|