CVE-2021-41079
Description
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
CWE
- CWE-20 — CWE-20 Improper Input Validation
Affected
- Apache Software Foundation / Apache Tomcat — v=Apache Tomcat 8.5 8.5.0 to 8.5.63 [affected]; v=Apache Tomcat 9 9.0.0-M1 to 9.0.43 [affected]; v=Apache Tomcat 10 10.0.0-M1 to 10.0.2 [affected]
CVSS
- (none)
References
- https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E x_refsource_MISC
- https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html mailing-list, x_refsource_MLIST
- https://security.netapp.com/advisory/ntap-20211008-0005/ x_refsource_CONFIRM
- https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe%40%3Cdev.tomcat.apache.org%3E mailing-list, x_refsource_MLIST
- https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a%40%3Cusers.tomcat.apache.org%3E mailing-list, x_refsource_MLIST
- https://www.debian.org/security/2021/dsa-4986 vendor-advisory, x_refsource_DEBIAN
Source
cvelistV5-main/cves/2021/41xxx/CVE-2021-41079.json