CVE Vulnerabilities

CVE-2021-30639

Improper Handling of Exceptional Conditions

Published: Jul 12, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

NameVendorStart VersionEnd Version
TomcatApache8.5.64 (including)8.5.64 (including)
TomcatApache9.0.44 (including)9.0.44 (including)
TomcatApache10.0.3 (including)10.0.3 (including)
TomcatApache10.0.4 (including)10.0.4 (including)
Tomcat6Ubuntutrusty*
Tomcat6Ubuntutrusty/esm*
Tomcat6Ubuntuxenial*
Tomcat7Ubuntubionic*
Tomcat7Ubuntutrusty*
Tomcat7Ubuntutrusty/esm*
Tomcat7Ubuntuxenial*
Tomcat8Ubuntubionic*
Tomcat8Ubuntuupstream*
Tomcat8Ubuntuxenial*
Tomcat9Ubuntubionic*
Tomcat9Ubuntufocal*
Tomcat9Ubuntugroovy*
Tomcat9Ubuntuhirsute*
Tomcat9Ubuntuimpish*
Tomcat9Ubuntukinetic*
Tomcat9Ubuntulunar*
Tomcat9Ubuntumantic*
Tomcat9Ubuntuoracular*
Tomcat9Ubuntuupstream*

References