[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1234

ID: oval:org.secpod.oval:def:1601025Date: (C)2019-07-30   (M)2023-12-14
Class: PATCHFamily: unix




The HTTP/2 implementation in Apache Tomcat accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. The SSI printenv command in Apache Tomcat echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website

Platform:
Amazon Linux AMI
Product:
tomcat8
Reference:
ALAS-2019-1234
CVE-2019-0221
CVE-2019-0199
CVE    2
CVE-2019-0199
CVE-2019-0221
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:tomcat8

© SecPod Technologies