CVE-2020-13934

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

References

https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E

https://www.debian.org/security/2020/dsa-4727

https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html

https://security.netapp.com/advisory/ntap-20200724-0003/

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2020.html

https://usn.ubuntu.com/4596-1/

https://www.oracle.com/security-alerts/cpujan2021.html

https://www.oracle.com/security-alerts/cpuApr2021.html

Details

Source: MITRE

Published: 2020-07-14

Updated: 2021-07-21

Type: CWE-119

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 8.5.1 to 8.5.56 (inclusive)

cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone6:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 9.0.1 to 9.0.36 (inclusive)

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
150936Apache Tomcat 10.0.0.M1 < 10.0.0.M7 multiple vulnerabilitiesNessusWeb Servers
high
701329Apache Tomcat < 10.0.0-M7 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
147719JFrog < 7.7.0 Multiple VulnerabilitiesNessusMisc.
high
141862Ubuntu 20.04 LTS : Tomcat vulnerabilities (USN-4596-1)NessusUbuntu Local Security Checks
high
112558Apache Tomcat 7.0.x < 7.0.105 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112557Apache Tomcat 8.5.x < 8.5.57 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112549Apache Tomcat 9.0.0.M1 < 9.0.37 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112548Apache Tomcat 10.0.0-M1 < 10.0.0-M7 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
139320RHEL 6 / 7 / 8 : Red Hat JBoss Web Server 5.3.2 (RHSA-2020:3306)NessusRed Hat Local Security Checks
high
139221openSUSE Security Update : tomcat (openSUSE-2020-1111)NessusSuSE Local Security Checks
high
139159EulerOS 2.0 SP8 : tomcat (EulerOS-SA-2020-1829)NessusHuawei Local Security Checks
high
139089Amazon Linux AMI : tomcat8 (ALAS-2020-1409)NessusAmazon Linux Local Security Checks
high
139052Photon OS 2.0: Apache PHSA-2020-2.0-0265NessusPhotonOS Local Security Checks
high
139046Photon OS 1.0: Apache PHSA-2020-1.0-0309NessusPhotonOS Local Security Checks
high
139021openSUSE Security Update : tomcat (openSUSE-2020-1102)NessusSuSE Local Security Checks
high
138923FreeBSD : Apache Tomcat -- Multiple Vulnerabilities (6a72eff7-ccd6-11ea-9172-4c72b94353b5)NessusFreeBSD Local Security Checks
high
138859Debian DLA-2286-1 : tomcat8 security updateNessusDebian Local Security Checks
high
138816Photon OS 3.0: Apache PHSA-2020-3.0-0116NessusPhotonOS Local Security Checks
high
138647Debian DSA-4727-1 : tomcat9 - security updateNessusDebian Local Security Checks
high
138591Apache Tomcat 9.0.0.M1 < 9.0.37 Multiple VulnerabilitiesNessusWeb Servers
high
138574Apache Tomcat 8.5.0 < 8.5.57 Multiple VulnerabilitiesNessusWeb Servers
high