Loading HuntDB...

CVE-2019-0199

UNKNOWN
Published 2019-04-10T14:21:50
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2019-0199. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Apache Tomcat Denial of Service vulnerability

GHSA-qcxh-w3j9-58qr

Advisory Details

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Affected Packages

Maven org.apache.tomcat.embed:tomcat-embed-core
ECOSYSTEM: ≥9.0.0 <9.0.16
Maven org.apache.tomcat.embed:tomcat-embed-core
ECOSYSTEM: ≥8.0.0 <8.5.38

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Advisory provided by GitHub Security Advisory Database. Published: June 15, 2020, Modified: December 8, 2023

References

HackerOne Reports

pvm
U.S. Dept Of Defense
Information Exposure Through an Error Message
Published: 2019-04-10T14:21:50
Last Modified: 2024-08-04T17:44:15.322Z
Copied to clipboard!