5
CVSSv2

CVE-2021-30639

Published: 12/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in Apache Tomcat allows an malicious user to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 10.0.4

apache tomcat 9.0.44

apache tomcat 10.0.3

apache tomcat 8.5.64

mcafee epolicy orchestrator 5.10.0

mcafee epolicy orchestrator

oracle big data spatial and graph

Vendor Advisories

Debian Bug report logs - #991046 tomcat9: CVE-2021-33037 CVE-2021-30640 CVE-2021-30639 Package: src:tomcat9; Maintainer for src:tomcat9 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Tue, 13 Jul 2021 12:12:27 UTC Severity: grave Tags: ...
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests This meant that once a non-blocking I/O error occurred, all future request ...