Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11996

Опубликовано: 26 июн. 2020
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

9.0.36-1
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

released

9.0.31-1ubuntu0.1
esm-apps/jammy

not-affected

9.0.36-1
esm-apps/noble

not-affected

9.0.36-1
esm-infra-legacy/trusty

DNE

focal

released

9.0.31-1ubuntu0.1
groovy

not-affected

9.0.36-1

Показывать по

Ссылки на источники

EPSS

Процентиль: 97%
0.31135
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 5 лет назад

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

CVSS3: 7.5
nvd
около 5 лет назад

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

CVSS3: 7.5
debian
около 5 лет назад

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat ...

suse-cvrf
около 5 лет назад

Security update for tomcat

suse-cvrf
около 5 лет назад

Security update for tomcat

EPSS

Процентиль: 97%
0.31135
Средний

5 Medium

CVSS2

7.5 High

CVSS3