CVE-2019-0199 Apache Tomcat HTTP/2 DoS Severity: Important
Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.14 Apache Tomcat 8.5.0 to 8.5.37 Description: The HTTP/2 implementation accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. Mitigation: Users of affected versions should apply one of the following mitigations: - Upgrade to Apache Tomcat 9.0.16 or later Note: Apache Tomcat 9.0.15 contains the necessary fixes but was not released - Upgrade to Apache Tomcat 8.5.38 or later Credit: The issue with excessive SETTINGS frames was reported by Michal Karm Babacek from Red Hat, Inc. As a result of his report the Tomcat Security team identified additional issues related to read/write timeouts. References: [1] http://tomcat.apache.org/security-9.html [2] http://tomcat.apache.org/security-8.html --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org