CVE Vulnerabilities

CVE-2021-30639

Improper Handling of Exceptional Conditions

Published: Jul 12, 2021 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Tomcat Apache 8.5.64 (including) 8.5.64 (including)
Tomcat Apache 9.0.44 (including) 9.0.44 (including)
Tomcat Apache 10.0.3 (including) 10.0.3 (including)
Tomcat Apache 10.0.4 (including) 10.0.4 (including)
Tomcat6 Ubuntu trusty *
Tomcat6 Ubuntu trusty/esm *
Tomcat6 Ubuntu xenial *
Tomcat7 Ubuntu bionic *
Tomcat7 Ubuntu trusty *
Tomcat7 Ubuntu trusty/esm *
Tomcat7 Ubuntu xenial *
Tomcat8 Ubuntu bionic *
Tomcat8 Ubuntu xenial *
Tomcat9 Ubuntu bionic *
Tomcat9 Ubuntu groovy *
Tomcat9 Ubuntu hirsute *
Tomcat9 Ubuntu impish *
Tomcat9 Ubuntu kinetic *
Tomcat9 Ubuntu lunar *
Tomcat9 Ubuntu mantic *

References