CVE-2020-13935
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/07/2020
Last modified:
07/11/2023
Description
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 7.0.27 (including) | 7.0.104 (including) |
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 8.5.0 (including) | 8.5.56 (including) |
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 9.0.1 (including) | 9.0.36 (including) |
| cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10332
- https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
- https://security.netapp.com/advisory/ntap-20200724-0003/
- https://usn.ubuntu.com/4448-1/
- https://usn.ubuntu.com/4596-1/
- https://www.debian.org/security/2020/dsa-4727
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html



