First published: Wed Sep 15 2021(Updated: )
A flaw was found in Apache Tomcat. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet can trigger an infinite loop, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jws5-tomcat | <0:9.0.43-13.redhat_00013.1.el7 | 0:9.0.43-13.redhat_00013.1.el7 |
redhat/jws5-tomcat | <0:9.0.43-13.redhat_00013.1.el8 | 0:9.0.43-13.redhat_00013.1.el8 |
Apache Tomcat | >=8.5.0<8.5.64 | |
Apache Tomcat | >=9.0.0<9.0.44 | |
Apache Tomcat | >=10.0.0<=10.0.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Netapp Management Services For Element Software And Netapp Hci | ||
redhat/tomcat | <10.0.4 | 10.0.4 |
redhat/tomcat | <9.0.44 | 9.0.44 |
redhat/tomcat | <8.5.64 | 8.5.64 |
IBM DRM | <=2.0.6 | |
debian/tomcat9 | 9.0.43-2~deb11u10 9.0.70-2 9.0.95-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-41079.
The severity of CVE-2021-41079 is high with a CVSS score of 7.5.
The affected software includes Apache Tomcat versions 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43, and 10.0.0-M1 to 10.0.2.
To fix CVE-2021-41079, you need to update Apache Tomcat to version 10.0.4, 9.0.44, or 8.5.64, depending on the version you are using.
You can find more information about CVE-2021-41079 in the references section.