
23/9/2024

7/11/2024

7/11/2024

11/2/2025
CVE-2024-38286: Apache Tomcat: Denial of Service
First published: Mon Sep 23 2024(Updated: )
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.
Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|
maven/org.apache.tomcat:tomcat-util | >=9.0.13<9.0.90 | 9.0.90 |
maven/org.apache.tomcat:tomcat-util | >=10.1.0-M1<10.1.25 | 10.1.25 |
maven/org.apache.tomcat:tomcat-util | >=11.0.0-M1<11.0.0-M21 | 11.0.0-M21 |
Apache Tomcat | >=9.0.13<9.0.90 | |
Apache Tomcat | >=10.1.1<10.1.25 | |
Apache Tomcat | =10.1.0-milestone1 | |
Apache Tomcat | =10.1.0-milestone10 | |
Apache Tomcat | =10.1.0-milestone11 | |
Apache Tomcat | =10.1.0-milestone12 | |
Apache Tomcat | =10.1.0-milestone13 | |
Apache Tomcat | =10.1.0-milestone14 | |
Apache Tomcat | =10.1.0-milestone15 | |
Apache Tomcat | =10.1.0-milestone16 | |
Apache Tomcat | =10.1.0-milestone17 | |
Apache Tomcat | =10.1.0-milestone18 | |
Apache Tomcat | =10.1.0-milestone19 | |
Apache Tomcat | =10.1.0-milestone2 | |
Apache Tomcat | =10.1.0-milestone20 | |
Apache Tomcat | =10.1.0-milestone3 | |
Apache Tomcat | =10.1.0-milestone4 | |
Apache Tomcat | =10.1.0-milestone5 | |
Apache Tomcat | =10.1.0-milestone6 | |
Apache Tomcat | =10.1.0-milestone7 | |
Apache Tomcat | =10.1.0-milestone8 | |
Apache Tomcat | =10.1.0-milestone9 | |
Apache Tomcat | =11.0.0-milestone1 | |
Apache Tomcat | =11.0.0-milestone10 | |
Apache Tomcat | =11.0.0-milestone11 | |
Apache Tomcat | =11.0.0-milestone12 | |
Apache Tomcat | =11.0.0-milestone13 | |
Apache Tomcat | =11.0.0-milestone14 | |
Apache Tomcat | =11.0.0-milestone15 | |
Apache Tomcat | =11.0.0-milestone16 | |
Apache Tomcat | =11.0.0-milestone17 | |
Apache Tomcat | =11.0.0-milestone18 | |
Apache Tomcat | =11.0.0-milestone19 | |
Apache Tomcat | =11.0.0-milestone2 | |
Apache Tomcat | =11.0.0-milestone20 | |
Apache Tomcat | =11.0.0-milestone3 | |
Apache Tomcat | =11.0.0-milestone4 | |
Apache Tomcat | =11.0.0-milestone5 | |
Apache Tomcat | =11.0.0-milestone6 | |
Apache Tomcat | =11.0.0-milestone7 | |
Apache Tomcat | =11.0.0-milestone8 | |
Apache Tomcat | =11.0.0-milestone9 | |
netapp ontap tools vmware vsphere | =9 | |
netapp ontap tools vmware vsphere | =10 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-38286?
CVE-2024-38286 is classified as a high severity vulnerability due to its potential to impact system performance and availability.
How do I fix CVE-2024-38286?
To address CVE-2024-38286, you should upgrade to Apache Tomcat version 9.0.90, 10.1.25, or 11.0.0-M21 depending on your current version.
Which versions of Apache Tomcat are affected by CVE-2024-38286?
CVE-2024-38286 affects Apache Tomcat versions from 11.0.0-M1 to 11.0.0-M20, 10.1.0-M1 to 10.1.24, and 9.0.13 to 9.0.89.
Can older versions of Apache Tomcat be affected by CVE-2024-38286?
Yes, older unsupported versions of Apache Tomcat may also be affected by CVE-2024-38286.
What is the nature of the vulnerability CVE-2024-38286?
CVE-2024-38286 is an Allocation of Resources Without Limits or Throttling vulnerability, which can allow excessive resource consumption.
- collector/oss-sec
- source/oss-sec
- alias/CVE-2024-38286
- agent/title
- agent/first-publish-date
- collector/redhat-bugzilla
- source/Red Hat
- agent/weakness
- agent/type
- agent/description
- agent/author
- collector/mitre-cve
- source/MITRE
- collector/nvd-cve
- source/NVD
- collector/github-advisory
- source/GitHub
- alias/GHSA-7jqf-v358-p8g7
- agent/software-canonical-lookup
- agent/trending
- agent/source
- collector/github-advisory-latest
- agent/last-modified-date
- agent/references
- collector/nvd-api
- agent/severity
- agent/softwarecombine
- agent/tags
- agent/event
- package-manager/maven
- vendor/apache
- canonical/apache tomcat
- version/apache tomcat/9.0.13
- version/apache tomcat/10.1.1
- version/apache tomcat/10.1.0-milestone1
- version/apache tomcat/10.1.0-milestone10
- version/apache tomcat/10.1.0-milestone11
- version/apache tomcat/10.1.0-milestone12
- version/apache tomcat/10.1.0-milestone13
- version/apache tomcat/10.1.0-milestone14
- version/apache tomcat/10.1.0-milestone15
- version/apache tomcat/10.1.0-milestone16
- version/apache tomcat/10.1.0-milestone17
- version/apache tomcat/10.1.0-milestone18
- version/apache tomcat/10.1.0-milestone19
- version/apache tomcat/10.1.0-milestone2
- version/apache tomcat/10.1.0-milestone20
- version/apache tomcat/10.1.0-milestone3
- version/apache tomcat/10.1.0-milestone4
- version/apache tomcat/10.1.0-milestone5
- version/apache tomcat/10.1.0-milestone6
- version/apache tomcat/10.1.0-milestone7
- version/apache tomcat/10.1.0-milestone8
- version/apache tomcat/10.1.0-milestone9
- version/apache tomcat/11.0.0-milestone1
- version/apache tomcat/11.0.0-milestone10
- version/apache tomcat/11.0.0-milestone11
- version/apache tomcat/11.0.0-milestone12
- version/apache tomcat/11.0.0-milestone13
- version/apache tomcat/11.0.0-milestone14
- version/apache tomcat/11.0.0-milestone15
- version/apache tomcat/11.0.0-milestone16
- version/apache tomcat/11.0.0-milestone17
- version/apache tomcat/11.0.0-milestone18
- version/apache tomcat/11.0.0-milestone19
- version/apache tomcat/11.0.0-milestone2
- version/apache tomcat/11.0.0-milestone20
- version/apache tomcat/11.0.0-milestone3
- version/apache tomcat/11.0.0-milestone4
- version/apache tomcat/11.0.0-milestone5
- version/apache tomcat/11.0.0-milestone6
- version/apache tomcat/11.0.0-milestone7
- version/apache tomcat/11.0.0-milestone8
- version/apache tomcat/11.0.0-milestone9
- vendor/netapp
- canonical/netapp ontap tools vmware vsphere
- version/netapp ontap tools vmware vsphere/9
- version/netapp ontap tools vmware vsphere/10
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203