You are viewing a plain text version of this content. The canonical link for it is here.
Posted to announce@apache.org by Mark Thomas <ma...@apache.org> on 2019/06/20 19:59:33 UTC

[SECURITY][CORRECTION] CVE-2019-10072 Apache Tomcat HTTP/2 DoS

This updated notice corrects the version numbers in the mitigation section.


CVE-2019-10072 Apache Tomcat HTTP/2 DoS

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 9.0.0.M1 to 9.0.19
Apache Tomcat 8.5.0 to 8.5.40

Description:
The fix for CVE-2019-0199 was incomplete and did not address connection
window exhaustion on write. By not sending WINDOW_UPDATE messages for
the connection window (stream 0) clients were able
to cause server-side threads to block eventually leading to thread
exhaustion and a DoS.

Mitigation:
Users of affected versions should apply one of the following mitigations:
- Upgrade to Apache Tomcat 9.0.20 or later
- Upgrade to Apache Tomcat 8.5.41 or later

Credit:
John Simpson of Trend Micro Security Research working with Trend
Micro's Zero Day Initiative

References:
[1] http://tomcat.apache.org/security-9.html
[2] http://tomcat.apache.org/security-8.html