Description
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2764-1 | tomcat8 security update |
Debian DSA |
DSA-4984-1 | tomcat9 security update |
EUVD |
EUVD-2021-1985 | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. |
Github GHSA |
GHSA-59g9-7gfx-c72p | Infinite loop in Tomcat due to parsing error |
Ubuntu USN |
USN-5360-1 | Tomcat vulnerabilities |
Ubuntu USN |
USN-6943-1 | Tomcat vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T02:59:31.226Z
Reserved: 2021-09-15T00:00:00.000Z
Link: CVE-2021-41079
No data.
Status : Modified
Published: 2021-09-16T15:15:07.690
Modified: 2024-11-21T06:25:24.313
Link: CVE-2021-41079
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN