Vulnerabilidad en peticiones HTTP/2 en Apache Tomcat (CVE-2020-11996)
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
26/06/2020
Última modificación:
07/11/2023
Descripción
Una secuencia especialmente diseñada de peticiones HTTP/2 enviadas a Apache Tomcat versiones 10.0.0-M1 hasta 10.0.0-M5, versiones 9.0.0.M1 hasta 9.0.35 y versiones 8.5.0 hasta 8.5.55, podría desencadenar un uso elevado de la CPU por varios segundos. Si se hacen una cantidad suficiente de tales peticiones en conexiones HTTP/2 concurrentes, el servidor podría dejar de responder
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 8.5.0 (incluyendo) | 8.5.55 (incluyendo) |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 9.0.0 (incluyendo) | 9.0.35 (incluyendo) |
cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html
- https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79%40%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b%40%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9%40%3Cnotifications.ofbiz.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
- https://security.netapp.com/advisory/ntap-20200709-0002/
- https://usn.ubuntu.com/4596-1/
- https://www.debian.org/security/2020/dsa-4727
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html