First published: Thu Oct 14 2021(Updated: )
Apache Tomcat is vulnerable to a denial of service, caused by a memory leak flaw in WebSocket connections. By sending a specially-crafted request using OutOfMemoryError, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-servlet-engine | <1:9.0.50-1.el9 | 1:9.0.50-1.el9 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el7 | 0:9.0.50-3.redhat_00004.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el7 | 0:1.2.30-3.redhat_3.el7 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el7 | 0:1.1.8-4.Final_redhat_00004.1.el7 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el8 | 0:9.0.50-3.redhat_00004.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el8 | 0:1.2.30-3.redhat_3.el8 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el8 | 0:1.1.8-4.Final_redhat_00004.1.el8 |
debian/tomcat9 | 9.0.31-1~deb10u6 9.0.31-1~deb10u10 9.0.43-2~deb11u6 9.0.43-2~deb11u9 9.0.70-2 | |
maven/org.apache.tomcat:tomcat | >=8.5.60<8.5.72 | 8.5.72 |
maven/org.apache.tomcat:tomcat | >=9.0.40<9.0.54 | 9.0.54 |
maven/org.apache.tomcat:tomcat | >=10.0.0-M1<10.0.12 | 10.0.12 |
maven/org.apache.tomcat:tomcat | >=10.1.0-M1<=10.1.0-M5 | 10.1.0-M6 |
redhat/tomcat | <10.1.0 | 10.1.0 |
redhat/tomcat | <10.0.12 | 10.0.12 |
redhat/tomcat | <9.0.54 | 9.0.54 |
redhat/tomcat | <8.5.72 | 8.5.72 |
Apache Tomcat | >=8.5.60<8.5.72 | |
Apache Tomcat | >=9.0.40<9.0.54 | |
Apache Tomcat | >=10.0.1<10.0.12 | |
Apache Tomcat | =10.0.0-milestone10 | |
Apache Tomcat | =10.1.0-milestone1 | |
Apache Tomcat | =10.1.0-milestone2 | |
Apache Tomcat | =10.1.0-milestone3 | |
Apache Tomcat | =10.1.0-milestone4 | |
Apache Tomcat | =10.1.0-milestone5 | |
Netapp Hci | ||
Netapp Management Services For Element Software | ||
Debian Debian Linux | =11.0 | |
Oracle Agile Engineering Data Management | =6.2.1.0 | |
Oracle Big Data Spatial And Graph | <23.1 | |
Oracle Communications Diameter Signaling Router | >=8.0.0.0<=8.5.0.2 | |
Oracle Hospitality Cruise Shipboard Property Management System | =20.1.0 | |
Oracle Managed File Transfer | =12.2.1.3.0 | |
Oracle Managed File Transfer | =12.2.1.4.0 | |
Oracle Middleware Common Libraries And Tools | =12.2.1.4.0 | |
Oracle Payment Interface | =19.1 | |
Oracle Payment Interface | =20.3 | |
Oracle Retail Customer Insights | =15.0.2 | |
Oracle Retail Customer Insights | =16.0.2 | |
Oracle Retail Data Extractor For Merchandising | =15.0.2 | |
Oracle Retail Data Extractor For Merchandising | =16.0.2 | |
Oracle Retail Eftlink | =21.0.0 | |
Oracle Retail Financial Integration | =16.0.1 | |
Oracle Retail Financial Integration | =19.0.0 | |
Oracle Retail Store Inventory Management | =14.0.4.13 | |
Oracle Retail Store Inventory Management | =14.1.3.5 | |
Oracle Retail Store Inventory Management | =14.1.3.14 | |
Oracle Retail Store Inventory Management | =15.0.3.3 | |
Oracle Retail Store Inventory Management | =15.0.3.8 | |
Oracle Retail Store Inventory Management | =16.0.3.7 | |
Oracle SD-WAN Edge | =9.0 | |
Oracle SD-WAN Edge | =9.1 | |
Oracle Taleo Platform | ||
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-42340 is a vulnerability in Apache Tomcat that allows for a denial of service attack caused by a memory leak flaw in WebSocket connections.
CVE-2021-42340 has a severity level of high.
Apache Tomcat versions 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53, and 8.5.60 to 8.5.71 are affected by CVE-2021-42340.
The fix for CVE-2021-42340 is available in Apache Tomcat 10.1.0-M6, 10.0.12, 9.0.54, and 8.5.72.
To mitigate the vulnerability, it is recommended to update Apache Tomcat to versions 10.1.0-M6, 10.0.12, 9.0.54, or 8.5.72.