CVE-2017-5650
17.04.2017, 16:59
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 8.5.0 |
apache | tomcat | 8.5.1 |
apache | tomcat | 8.5.2 |
apache | tomcat | 8.5.3 |
apache | tomcat | 8.5.4 |
apache | tomcat | 8.5.5 |
apache | tomcat | 8.5.6 |
apache | tomcat | 8.5.7 |
apache | tomcat | 8.5.8 |
apache | tomcat | 8.5.9 |
apache | tomcat | 8.5.10 |
apache | tomcat | 8.5.11 |
apache | tomcat | 8.5.12 |
apache | tomcat | 9.0.0:milestone1 |
apache | tomcat | 9.0.0:milestone10 |
apache | tomcat | 9.0.0:milestone11 |
apache | tomcat | 9.0.0:milestone12 |
apache | tomcat | 9.0.0:milestone13 |
apache | tomcat | 9.0.0:milestone14 |
apache | tomcat | 9.0.0:milestone15 |
apache | tomcat | 9.0.0:milestone16 |
apache | tomcat | 9.0.0:milestone17 |
apache | tomcat | 9.0.0:milestone18 |
apache | tomcat | 9.0.0:milestone2 |
apache | tomcat | 9.0.0:milestone3 |
apache | tomcat | 9.0.0:milestone4 |
apache | tomcat | 9.0.0:milestone5 |
apache | tomcat | 9.0.0:milestone6 |
apache | tomcat | 9.0.0:milestone7 |
apache | tomcat | 9.0.0:milestone8 |
apache | tomcat | 9.0.0:milestone9 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References