org.apache.tomcat:tomcat-coyote@9.0.87 vulnerabilities

  • latest version

    11.0.10

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.tomcat:tomcat-coyote package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Resource Shutdown or Release

    org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.

    Affected versions of this package are vulnerable to Improper Resource Shutdown or Release via the HTTP/2 Handler. An attacker can cause a denial of service by sending specially crafted requests that exploit improper handling of resource shutdown.

    How to fix Improper Resource Shutdown or Release?

    Upgrade org.apache.tomcat:tomcat-coyote to version 9.0.108, 10.1.44, 11.0.10 or higher.

    [9.0.0.M1,9.0.108)[10.1.0-M1,10.1.44)[11.0.0-M1,11.0.10)
    • H
    Allocation of Resources Without Limits or Throttling

    org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via HTTP/2 multiplexing feature. an attacker can trigger resource exhaustion by creating excessive HTTP/2 streams within a single TCP connection.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.apache.tomcat:tomcat-coyote to version 9.0.107, 10.1.43, 11.0.9 or higher.

    [9.0.0.M1,9.0.107)[10.1.0-M1,10.1.43)[11.0.0-M1,11.0.9)
    • H
    Improper Cleanup on Thrown Exception

    org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.

    Affected versions of this package are vulnerable to Improper Cleanup on Thrown Exception when handling failed HTTP/2 requests with certain invalid HTTP priority headers. An attacker can trigger an OutOfMemoryException by sending a large number of malicious requests.

    Note: The project maintainers note that version 9.0.103 also fixes the vulnerability but was never officially released.

    How to fix Improper Cleanup on Thrown Exception?

    Upgrade org.apache.tomcat:tomcat-coyote to version 9.0.104, 10.1.40, 11.0.6 or higher.

    [9.0.76,9.0.104)[10.1.10,10.1.40)[11.0.0-M2,11.0.6)
    • H
    Allocation of Resources Without Limits or Throttling

    org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the unwrap() function in SecureNio2Channel class, during a TLS handshake. Under certain configurations using TLS 1.3, an attacker can trigger an OutOfMemoryError.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.apache.tomcat:tomcat-coyote to version 9.0.90, 10.1.25, 11.0.0-M21 or higher.

    [9.0.13,9.0.90)[10.1.0-M1,10.1.25)[11.0.0-M1,11.0.0-M21)
    • H
    Insufficient Session Expiration

    org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.

    Affected versions of this package are vulnerable to Insufficient Session Expiration due to an infinite timeout being assigned to an open connection improperly, in http2/Stream.java. An attacker can force this situation by sending an HTTP/2 stream with excessive headers, causing an out-of-memory error or exhausting maxConnections.

    How to fix Insufficient Session Expiration?

    Upgrade org.apache.tomcat:tomcat-coyote to version 9.0.90, 10.1.25, 11.0.0-M21 or higher.

    [,9.0.90)[10.1.0-M1,10.1.25)[11.0.0-M1,11.0.0-M21)