Apache Tomcat HTTP/2 Header Parsing Error Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1037330 |
SecurityTracker URL: http://securitytracker.com/id/1037330
|
CVE Reference:
CVE-2016-6817
(Links to External Site)
|
Date: Nov 23 2016
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 8.5.0 to 8.5.6, 9.0.0.M1 to 9.0.0.M11
|
Description:
A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions on the target system.
A remote user can send a specially crafted HTTP/2 header to cause the target service to enter an infinite loop.
|
Impact:
A remote user can cause denial of service conditions.
|
Solution:
The vendor has issued a fix (8.5.8, 9.0.0.M13).
The vendor advisories are available at:
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
|
Vendor URL: tomcat.apache.org/security-9.html (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|