Denial of Service (DoS) Affecting org.apache.tomcat:tomcat-coyote package, versions [,8.5.94) [9.0.0,9.0.81) [10.0.0,10.1.14) [11.0.0-M3,11.0.0-M12)
Threat Intelligence
Exploit Maturity
Mature
EPSS
83.78% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHETOMCAT-5953330
- published 11 Oct 2023
- disclosed 10 Oct 2023
- credit Unknown
Introduced: 10 Oct 2023
CVE-2023-44487 Open this link in a new tabHow to fix?
Upgrade org.apache.tomcat:tomcat-coyote
to version 8.5.94, 9.0.81, 10.1.14, 11.0.0-M12 or higher.
Overview
org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.
Affected versions of this package are vulnerable to Denial of Service (DoS) in the implementation of the HTTP/2 protocol. An attacker can cause a denial of service (including via DDoS) by rapidly resetting many streams through request cancellation.