Description
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
References (6)
Core 6
Core References
Mailing List, Vendor Advisory x_refsource_misc
https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20211008-0005/
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe%40%3Cdev.tomcat.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a%40%3Cusers.tomcat.apache.org%3E
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2021/dsa-4986
Scores
CVSS v3
7.5
EPSS
0.0011
EPSS Percentile
29.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-20
CWE-835
Status
published
Products (6)
apache/tomcat
8.5.0 - 8.5.64
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
netapp/management_services_for_element_software_and_netapp_hci
org.apache.tomcat/tomcat
10.0.0 - 10.0.4Maven
Published
Sep 16, 2021
Tracked Since
Feb 18, 2026