Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Management Services For Element Software And Netapp Hci Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Subscribe
Openshift Application Runtimes Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2764-1 tomcat8 security update
EUVD EUVD EUVD-2021-1985 Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
Github GHSA Github GHSA GHSA-59g9-7gfx-c72p Infinite loop in Tomcat due to parsing error
Ubuntu USN Ubuntu USN USN-5360-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-6943-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T02:59:31.226Z

Reserved: 2021-09-15T00:00:00

Link: CVE-2021-41079

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-16T15:15:07.690

Modified: 2024-11-21T06:25:24.313

Link: CVE-2021-41079

cve-icon Redhat

Severity : Important

Publid Date: 2021-09-15T00:00:00Z

Links: CVE-2021-41079 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses