Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13934

Опубликовано: 14 июл. 2020
Источник: debian
EPSS Средний

Описание

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9fixed9.0.37-1package
tomcat8removedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/07/14/4

  • https://github.com/apache/tomcat/commit/923d834500802a61779318911d7898bd85fc950e (8.5.57)

  • https://github.com/apache/tomcat/commit/172977f04a5215128f1e278a688983dcd230f399 (9.0.37)

EPSS

Процентиль: 96%
0.22718
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

CVSS3: 7.5
redhat
почти 5 лет назад

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

CVSS3: 7.5
nvd
почти 5 лет назад

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

CVSS3: 7.5
github
больше 3 лет назад

Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat

CVSS3: 7.5
fstec
почти 5 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с выходом операции за границы буфера, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 96%
0.22718
Средний