CVE-2020-11996

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

References

https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

https://security.netapp.com/advisory/ntap-20200709-0002/

https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html

https://www.debian.org/security/2020/dsa-4727

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html

https://lists.apache.org/thread.html/[email protected]%3Cusers.tomcat.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2020.html

https://usn.ubuntu.com/4596-1/

https://www.oracle.com/security-alerts/cpujan2021.html

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.ofbiz.apache.org%3E

Details

Source: MITRE

Published: 2020-06-26

Updated: 2021-07-21

Type: CWE-400

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 8.5.0 to 8.5.55 (inclusive)

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 9.0.0 to 9.0.35 (inclusive)

cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3

OR

cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to 8.0.21 (inclusive)

cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:* versions up to 20.12 (inclusive)

cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*

cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:netapp:oncommand_system_manager:3.0:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_system_manager:3.1.3:*:*:*:*:*:*:*

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
150938Apache Tomcat 10.0.0.M1 < 10.0.0.M6 vulnerabilityNessusWeb Servers
high
701331Apache Tomcat < 10.0.0-M6 VulnerabilityNessus Network MonitorWeb Servers
medium
147719JFrog < 7.7.0 Multiple VulnerabilitiesNessusMisc.
high
143199RHEL 6 : Red Hat JBoss Web Server 5.4 security release (Moderate) (RHSA-2020:5170)NessusRed Hat Local Security Checks
high
141862Ubuntu 20.04 LTS : Tomcat vulnerabilities (USN-4596-1)NessusUbuntu Local Security Checks
high
112561Apache Tomcat 8.5.x < 8.5.56 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112560Apache Tomcat 9.0.0.M1 < 9.0.36 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112559Apache Tomcat 10.0.0-M1 < 10.0.0-M6 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
139159EulerOS 2.0 SP8 : tomcat (EulerOS-SA-2020-1829)NessusHuawei Local Security Checks
high
138987openSUSE Security Update : tomcat (openSUSE-2020-1063)NessusSuSE Local Security Checks
high
138983openSUSE Security Update : tomcat (openSUSE-2020-1051)NessusSuSE Local Security Checks
high
138923FreeBSD : Apache Tomcat -- Multiple Vulnerabilities (6a72eff7-ccd6-11ea-9172-4c72b94353b5)NessusFreeBSD Local Security Checks
high
138814Photon OS 2.0: Apache PHSA-2020-2.0-0263NessusPhotonOS Local Security Checks
high
138812Photon OS 3.0: Apache PHSA-2020-3.0-0114NessusPhotonOS Local Security Checks
high
138647Debian DSA-4727-1 : tomcat9 - security updateNessusDebian Local Security Checks
high
138516Photon OS 1.0: Apache PHSA-2020-1.0-0308NessusPhotonOS Local Security Checks
high
138393Debian DLA-2279-1 : tomcat8 security updateNessusDebian Local Security Checks
high
138098Apache Tomcat 9.0.0.M1 < 9.0.36 DoSNessusWeb Servers
high
138097Apache Tomcat 8.5.0 < 8.5.56 DoSNessusWeb Servers
high