CVE Vulnerabilities

CVE-2024-34750

Uncontrolled Resource Consumption

Published: Jul 03, 2024 | Modified: Nov 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.

The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected.

Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
TomcatApache9.0.0 (including)9.0.90 (excluding)
TomcatApache10.1.0 (including)10.1.25 (excluding)
TomcatApache11.0.0-milestone1 (including)11.0.0-milestone1 (including)
TomcatApache11.0.0-milestone10 (including)11.0.0-milestone10 (including)
TomcatApache11.0.0-milestone11 (including)11.0.0-milestone11 (including)
TomcatApache11.0.0-milestone12 (including)11.0.0-milestone12 (including)
TomcatApache11.0.0-milestone13 (including)11.0.0-milestone13 (including)
TomcatApache11.0.0-milestone14 (including)11.0.0-milestone14 (including)
TomcatApache11.0.0-milestone15 (including)11.0.0-milestone15 (including)
TomcatApache11.0.0-milestone16 (including)11.0.0-milestone16 (including)
TomcatApache11.0.0-milestone17 (including)11.0.0-milestone17 (including)
TomcatApache11.0.0-milestone18 (including)11.0.0-milestone18 (including)
TomcatApache11.0.0-milestone19 (including)11.0.0-milestone19 (including)
TomcatApache11.0.0-milestone2 (including)11.0.0-milestone2 (including)
TomcatApache11.0.0-milestone20 (including)11.0.0-milestone20 (including)
TomcatApache11.0.0-milestone3 (including)11.0.0-milestone3 (including)
TomcatApache11.0.0-milestone4 (including)11.0.0-milestone4 (including)
TomcatApache11.0.0-milestone5 (including)11.0.0-milestone5 (including)
TomcatApache11.0.0-milestone6 (including)11.0.0-milestone6 (including)
TomcatApache11.0.0-milestone7 (including)11.0.0-milestone7 (including)
TomcatApache11.0.0-milestone8 (including)11.0.0-milestone8 (including)
TomcatApache11.0.0-milestone9 (including)11.0.0-milestone9 (including)
Red Hat Enterprise Linux 8RedHattomcat-1:9.0.87-1.el8_10.2*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHattomcat-1:9.0.87-1.el8_8.3*
Red Hat Enterprise Linux 9RedHattomcat-1:9.0.87-1.el9_4.2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHattomcat-1:9.0.87-1.el9_2.2*
Red Hat JBoss Web Server 5RedHatjws5-tomcat*
Red Hat JBoss Web Server 5.8 on RHEL 7RedHatjws5-tomcat-0:9.0.87-5.redhat_00005.1.el7jws*
Red Hat JBoss Web Server 5.8 on RHEL 8RedHatjws5-tomcat-0:9.0.87-5.redhat_00005.1.el8jws*
Red Hat JBoss Web Server 5.8 on RHEL 9RedHatjws5-tomcat-0:9.0.87-5.redhat_00005.1.el9jws*
Red Hat JBoss Web Server 6RedHatjws6-tomcat*
Red Hat JBoss Web Server 6.0 on RHEL 8RedHatjws6-tomcat-0:10.1.8-10.redhat_00018.1.el8jws*
Red Hat JBoss Web Server 6.0 on RHEL 9RedHatjws6-tomcat-0:10.1.8-10.redhat_00018.1.el9jws*
Tomcat10Ubuntuesm-apps/noble*
Tomcat10Ubuntumantic*
Tomcat10Ubuntunoble*
Tomcat10Ubuntuupstream*
Tomcat6Ubuntutrusty/esm*
Tomcat6Ubuntuupstream*
Tomcat7Ubuntutrusty/esm*
Tomcat7Ubuntuupstream*
Tomcat9Ubuntudevel*
Tomcat9Ubuntuesm-apps/bionic*
Tomcat9Ubuntuesm-apps/focal*
Tomcat9Ubuntuesm-apps/jammy*
Tomcat9Ubuntuesm-apps/noble*
Tomcat9Ubuntufocal*
Tomcat9Ubuntujammy*
Tomcat9Ubuntumantic*
Tomcat9Ubuntunoble*
Tomcat9Ubuntuoracular*
Tomcat9Ubuntuplucky*
Tomcat9Ubuntuquesting*
Tomcat9Ubuntuupstream*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References