A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
17
Affected Products
14
References
apache / tomcat
| apache | tomcat | - | - |
| apache | tomcat | - | - |
| mcafee | epolicy_orchestrator | 5.10.0 | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| mcafee | epolicy_orchestrator | - | - |
| oracle | big_data_spatial_and_graph | 23.1 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact