We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34750

Apache Tomcat: HTTP/2 excess header handling DoS



Description

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

Reserved 2024-05-08 | Published 2024-07-03 | Updated 2024-08-16 | Assigner apache

Problem types

CWE-755 Improper Handling of Exceptional Conditions

CWE-400 Uncontrolled Resource Consumption

Product status

Default status
unaffected

11.0.0-M1
affected

10.1.0-M1
affected

9.0.0-M1
affected

Credits

devme4f from VNPT-VCI finder

References

lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l vendor-advisory

cve.org (CVE-2024-34750)

nvd.nist.gov (CVE-2024-34750)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-34750

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.