Multiple vulnerabilities in Apache Tomcat



Published: 2020-07-14
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2020-13935
CVE-2020-13934
CWE-ID CWE-835
CWE-399
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
Apache Tomcat
Server applications / Web servers

Vendor Apache Foundation

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Infinite loop

EUVDB-ID: #VU29723

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-13935

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing payload length in a WebSocket frame. A remote attacker can send a specially crafted request to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Apache Tomcat: 10.0.0-M1 - 10.0.0.0-M1, 9.0.0 - 9.0.36, 8.5.0 - 8.5.56, 7.0.27 - 7.0.104


CPE2.3 External links

http://seclists.org/oss-sec/2020/q3/24
http://tomcat.apache.org/security-10.html
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Resource management error

EUVDB-ID: #VU29724

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-13934

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources when processing h2 direct connections. A remote attacker can pass specially crafted HTTP/2 requests to the server and consume all available memory.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Apache Tomcat: 10.0.0-M1 - 10.0.0.0-M1, 9.0.0 - 9.0.36, 8.5.1 - 8.5.56


CPE2.3 External links

http://seclists.org/oss-sec/2020/q3/25
http://tomcat.apache.org/security-10.html
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-8.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###