CVE-2016-6817
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/08/2017
Last modified:
20/04/2025
Description
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/94462
- http://www.securitytracker.com/id/1037330
- https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/a9f24571460af003071475b75f18cad81ebcc36fa7c876965a75e32a%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
- https://security.netapp.com/advisory/ntap-20180607-0001/
- http://www.securityfocus.com/bid/94462
- http://www.securitytracker.com/id/1037330
- https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/a9f24571460af003071475b75f18cad81ebcc36fa7c876965a75e32a%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
- https://security.netapp.com/advisory/ntap-20180607-0001/



