VID |
22955 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 7.0.105. It is, therefore, affected by a WebSocket DoS vulnerability. The payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
* References: https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84 https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784 https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
* Platforms Affected: Apache Tomcat Server versions 7.0.x prior to 7.0.105 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.105 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2020-13935 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|