CVE-2020-13935
14.07.2020, 15:15
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
Vendor | Product | Version |
---|---|---|
apache | tomcat | 7.0.27 ≤ 𝑥 ≤ 7.0.104 |
apache | tomcat | 8.5.0 ≤ 𝑥 ≤ 8.5.56 |
apache | tomcat | 9.0.1 ≤ 𝑥 ≤ 9.0.36 |
apache | tomcat | 9.0.0:milestone1 |
apache | tomcat | 9.0.0:milestone10 |
apache | tomcat | 9.0.0:milestone11 |
apache | tomcat | 9.0.0:milestone12 |
apache | tomcat | 9.0.0:milestone13 |
apache | tomcat | 9.0.0:milestone14 |
apache | tomcat | 9.0.0:milestone15 |
apache | tomcat | 9.0.0:milestone16 |
apache | tomcat | 9.0.0:milestone17 |
apache | tomcat | 9.0.0:milestone18 |
apache | tomcat | 9.0.0:milestone19 |
apache | tomcat | 9.0.0:milestone2 |
apache | tomcat | 9.0.0:milestone20 |
apache | tomcat | 9.0.0:milestone21 |
apache | tomcat | 9.0.0:milestone22 |
apache | tomcat | 9.0.0:milestone23 |
apache | tomcat | 9.0.0:milestone24 |
apache | tomcat | 9.0.0:milestone25 |
apache | tomcat | 9.0.0:milestone26 |
apache | tomcat | 9.0.0:milestone27 |
apache | tomcat | 9.0.0:milestone3 |
apache | tomcat | 9.0.0:milestone4 |
apache | tomcat | 9.0.0:milestone5 |
apache | tomcat | 9.0.0:milestone6 |
apache | tomcat | 9.0.0:milestone7 |
apache | tomcat | 9.0.0:milestone8 |
apache | tomcat | 9.0.0:milestone9 |
apache | tomcat | 10.0.0:milestone1 |
apache | tomcat | 10.0.0:milestone2 |
apache | tomcat | 10.0.0:milestone3 |
apache | tomcat | 10.0.0:milestone4 |
apache | tomcat | 10.0.0:milestone5 |
apache | tomcat | 10.0.0:milestone6 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
netapp | oncommand_system_manager | 3.0.0 ≤ 𝑥 ≤ 3.1.3 |
opensuse | leap | 15.1 |
opensuse | leap | 15.2 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 20.04 |
mcafee | epolicy_orchestrator | 5.9.0 |
mcafee | epolicy_orchestrator | 5.9.1 |
mcafee | epolicy_orchestrator | 5.10.0 |
mcafee | epolicy_orchestrator | 5.10.0:update_1 |
mcafee | epolicy_orchestrator | 5.10.0:update_2 |
mcafee | epolicy_orchestrator | 5.10.0:update_3 |
mcafee | epolicy_orchestrator | 5.10.0:update_4 |
mcafee | epolicy_orchestrator | 5.10.0:update_5 |
mcafee | epolicy_orchestrator | 5.10.0:update_6 |
mcafee | epolicy_orchestrator | 5.10.0:update_7 |
mcafee | epolicy_orchestrator | 5.10.0:update_8 |
oracle | agile_engineering_data_management | 6.2.1.0 |
oracle | agile_plm | 9.3.3 |
oracle | agile_plm | 9.3.5 |
oracle | agile_plm | 9.3.6 |
oracle | blockchain_platform | 𝑥 < 21.1.2 |
oracle | commerce_guided_search | 11.3.2 |
oracle | communications_cloud_native_core_policy | 1.14.0 |
oracle | communications_instant_messaging_server | 10.0.1.5.0 |
oracle | fmw_platform | 12.2.1.3.0 |
oracle | fmw_platform | 12.2.1.4.0 |
oracle | instantis_enterprisetrack | 17.1 |
oracle | instantis_enterprisetrack | 17.2 |
oracle | instantis_enterprisetrack | 17.3 |
oracle | managed_file_transfer | 12.2.1.3.0 |
oracle | managed_file_transfer | 12.2.1.4.0 |
oracle | mysql_enterprise_monitor | 𝑥 ≤ 8.0.21 |
oracle | siebel_ui_framework | 𝑥 ≤ 20.12 |
oracle | workload_manager | 12.2.0.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat6 |
| ||||||||||||||||||||||||||
tomcat7 |
| ||||||||||||||||||||||||||
tomcat8 |
| ||||||||||||||||||||||||||
tomcat9 |
|
Common Weakness Enumeration
References