The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
2017-08-10T22:29:00.233
2025-04-20T01:37:25.860
Deferred
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | apache | tomcat | 8.5.0 | Yes |
| Application | apache | tomcat | 8.5.1 | Yes |
| Application | apache | tomcat | 8.5.2 | Yes |
| Application | apache | tomcat | 8.5.3 | Yes |
| Application | apache | tomcat | 8.5.4 | Yes |
| Application | apache | tomcat | 8.5.5 | Yes |
| Application | apache | tomcat | 8.5.6 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |
| Application | apache | tomcat | 9.0.0 | Yes |