Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-0199

Опубликовано: 10 апр. 2019
Источник: debian
EPSS Средний

Описание

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9fixed9.0.16-1package
tomcat8fixed8.5.38-1package
tomcat8not-affectedjessiepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1693325

  • When fixing this issue make sure to fix it completely to not open CVE-2019-10072.

EPSS

Процентиль: 98%
0.64304
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
redhat
около 6 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
nvd
около 6 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

suse-cvrf
почти 6 лет назад

Security update for tomcat

suse-cvrf
почти 6 лет назад

Security update for tomcat

EPSS

Процентиль: 98%
0.64304
Средний