445
VMScore

CVE-2020-9494

Published: 24/06/2020 Updated: 21/07/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that Tomcat did not properly validate the input length. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-9494, CVE-2021-25329, CVE-2021-41079)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

debian debian linux 10.0

Vendor Advisories

Several security issues were fixed in Tomcat ...
Debian Bug report logs - #963629 trafficserver: CVE-2020-9494 Package: src:trafficserver; Maintainer for src:trafficserver is Jean Baptiste Favre <debian@jbfavreorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 24 Jun 2020 20:30:02 UTC Severity: important Tags: security, upstream Found in versi ...
A vulnerability was discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service via malformed HTTP/2 headers For the stable distribution (buster), this problem has been fixed in version 802+ds-1+deb10u3 We recommend that you upgrade your trafficserver packages For the detailed security statu ...

Mailing Lists

Credit: This issue was identified by Trung Pham of Viettel Cyber Security References: listsapacheorg/threadhtml/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannouncetomcatapacheorg%3E ...