[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5665-1 tomcat10 -- tomcat10

ID: oval:org.secpod.oval:def:613059Date: (C)2024-04-26   (M)2024-04-26
Class: PATCHFamily: unix




Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine. CVE-2023-46589 Tomcat 10 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. CVE-2024-24549 Denial of Service due to improper input validation vulnerability for HTTP/2. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed. CVE-2024-23672 Denial of Service via incomplete cleanup vulnerability. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.

Platform:
Debian 12.x
Product:
libtomcat10-java
libtomcat10-embed-java
tomcat10
Reference:
DSA-5665-1
CVE-2023-46589
CVE-2024-23672
CVE-2024-24549
CVE    3
CVE-2023-46589
CVE-2024-24549
CVE-2024-23672

© SecPod Technologies