First published: Wed Sep 25 2024(Updated: )
Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2314686 is critical as it allows attackers to exploit the TLS handshake process, potentially leading to an OutOfMemoryError.
To fix REDHAT-BUG-2314686, you should update to the latest patched version of Apache Tomcat that addresses the TLS handshake vulnerability.
REDHAT-BUG-2314686 affects Apache Tomcat on any platform where it is deployed with specific configurations.
The impact of REDHAT-BUG-2314686 can lead to service disruption due to OutOfMemoryErrors, affecting application performance and availability.
Currently, the recommended course of action for REDHAT-BUG-2314686 is to apply the software updates rather than relying on a workaround.