Improper Handling of Exceptional Conditions in Apache Tomcat
High severity
GitHub Reviewed
Published
Aug 13, 2021
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Package
Affected versions
>= 10.0.3, < 10.0.5
>= 9.0.0, < 9.0.45
< 8.5.65
Patched versions
10.0.5
9.0.45
8.5.65
Description
Published by the National Vulnerability Database
Jul 12, 2021
Reviewed
Jul 13, 2021
Published to the GitHub Advisory Database
Aug 13, 2021
Last updated
Feb 3, 2023
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
References