Description
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4596-1 | tomcat8 security update |
Github GHSA |
GHSA-qcxh-w3j9-58qr | Apache Tomcat Denial of Service vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T17:44:15.322Z
Reserved: 2018-11-14T00:00:00.000Z
Link: CVE-2019-0199
No data.
Status : Modified
Published: 2019-04-10T15:29:00.390
Modified: 2024-11-21T04:16:28.177
Link: CVE-2019-0199
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA