[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5667-1 tomcat9 -- tomcat9

ID: oval:org.secpod.oval:def:613063Date: (C)2024-04-26   (M)2024-04-26
Class: PATCHFamily: unix




Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine. CVE-2023-46589 Tomcat 9 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. CVE-2024-24549 Denial of Service due to improper input validation vulnerability for HTTP/2. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed. CVE-2024-23672 Denial of Service via incomplete cleanup vulnerability. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.

Platform:
Debian 11.x
Product:
libtomcat9-embed-java
libtomcat9-java
tomcat9
Reference:
DSA-5667-1
CVE-2023-46589
CVE-2024-23672
CVE-2024-24549
CVE    3
CVE-2023-46589
CVE-2024-24549
CVE-2024-23672
CPE    4
cpe:/a:apache:libtomcat9-java
cpe:/a:apache:libtomcat9-embed-java
cpe:/o:debian:debian_linux:11.x
cpe:/a:apache:tomcat:9
...

© SecPod Technologies