2 months ago 445

Awaiting Analysis

This vulnerability is presently awaiting analysis.


A vulnerability successful Apache Tomcat allows an attacker to remotely trigger a denial of service. An mistake introduced arsenic portion of a alteration to amended mistake handling during non-blocking I/O meant that the mistake emblem associated with the Request entity was not reset betwixt requests. This meant that erstwhile a non-blocking I/O mistake occurred, each aboriginal requests handled by that petition entity would fail. Users were capable to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the anticipation of triggering a DoS. Applications that bash not usage non-blocking I/O are not exposed to this vulnerability. This contented affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.


CVSS 3.x Severity and Metrics:



Base Score:  N/A

NVD score not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Change History

0 alteration records recovered show changes

Read Entire Article