You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
CVE-2016-6817 - High Severity Vulnerability
Core Tomcat implementation
path: /root/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar
Library home page: http://tomcat.apache.org/
Dependency Hierarchy:
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
Publish Date: 2017-08-10
URL: CVE-2016-6817
Base Score Metrics:
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1037330
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (8.5.8, 9.0.0.M13).
The vendor advisories are available at:
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: