First published: Mon Jul 12 2021(Updated: )
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat9 | 9.0.31-1~deb10u6 9.0.31-1~deb10u10 9.0.43-2~deb11u6 9.0.43-2~deb11u9 9.0.70-2 | |
IBM DRM | <=2.0.6 | |
Apache Tomcat | =8.5.64 | |
Apache Tomcat | =9.0.44 | |
Apache Tomcat | =10.0.3 | |
Apache Tomcat | =10.0.4 | |
McAfee ePolicy Orchestrator | <5.10.0 | |
McAfee ePolicy Orchestrator | =5.10.0 | |
McAfee ePolicy Orchestrator | =5.10.0-update_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_10 | |
McAfee ePolicy Orchestrator | =5.10.0-update_2 | |
McAfee ePolicy Orchestrator | =5.10.0-update_3 | |
McAfee ePolicy Orchestrator | =5.10.0-update_4 | |
McAfee ePolicy Orchestrator | =5.10.0-update_5 | |
McAfee ePolicy Orchestrator | =5.10.0-update_6 | |
McAfee ePolicy Orchestrator | =5.10.0-update_7 | |
McAfee ePolicy Orchestrator | =5.10.0-update_8 | |
McAfee ePolicy Orchestrator | =5.10.0-update_9 | |
Oracle Big Data Spatial And Graph | <23.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30639 is a vulnerability in Apache Tomcat that allows an attacker to remotely trigger a denial of service.
The severity of CVE-2021-30639 is high with a CVSS score of 7.5.
CVE-2021-30639 affects Apache Tomcat versions 8.5.64, 9.0.44, 10.0.3, and 10.0.4.
Yes, there are fixes available for CVE-2021-30639. The recommended version is 9.0.31-1~deb10u6, 9.0.31-1~deb10u10, 9.0.43-2~deb11u6, 9.0.43-2~deb11u9, or 9.0.70-2.
More information about CVE-2021-30639 can be found at the following references: [link1](https://bz.apache.org/bugzilla/show_bug.cgi?id=65203), [link2](https://github.com/apache/tomcat/commit/8ece47c4a9fb9349e8862c84358a4dd23c643a24), [link3](https://github.com/apache/tomcat/commit/411caf29ac1c16e6ac291b6e5543b2371dbd25e2).