OSV logo
  • Vulnerability Database
  • Blog
  • FAQ
  • Docs
    • Github Logo

CVE-2016-6817

See a problem?
Please try reporting it to the source first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2016-6817
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6817.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-6817
Aliases
  • GHSA-698c-2x4j-g9gq
Published
2017-08-10T22:29:00Z
Modified
2025-04-20T01:37:25Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.

References
  • http://www.securityfocus.com/bid/94462
  • http://www.securitytracker.com/id/1037330
  • https://security.netapp.com/advisory/ntap-20180607-0001/
  • https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
  • https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
  • https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
  • https://lists.apache.org/thread.html/a9f24571460af003071475b75f18cad81ebcc36fa7c876965a75e32a%40%3Cannounce.tomcat.apache.org%3E
  • https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E

Affected packages

Git / github.com/apache/tomcat

Affected ranges

Type
GIT
Repo
https://github.com/apache/tomcat
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
10e04de1946981261a734507f4a6d953e2a206fe
Last affected
18b014d8691909be6153ae7db022a6c35f9c93ea
Last affected
29b07def810d335012e738b22ab44d4e232b50d1
Last affected
389365303d986b2a918bc95f39421b27a2c9ff30
Last affected
3e5565173dfe107f90419ab63bd4e2e7edc9deb4
Last affected
45f8fd74cdb96490fab8709263a4d862f0d429cf
Last affected
61ff12fb282b1d00593b8d16e94ab8ec02f8d5be
Last affected
65ddc3a3872ea41ca67fec7b6834c704b6893361
Last affected
aba238718ac9b149d25feaa9a14ecad3b0e3a5e2
Last affected
bdd72e8bc872876689e41631e47942366ca03364
Last affected
c6a2c4ed296c7f8839b72e8e31cb53b84102d02c
Last affected
c7b84102600d600bcc527560d9c4d10c3fd440ab
Last affected
d1dc05e934e089ea8907998cf850760017a0ed82
Last affected
d8ebf61e51b4455e3c226751e492a533f9002d48
Last affected
e37b977db6f47e4380ad67114a49e8568951c953
Last affected
f5dffa6e1148080fe5dc3690df917e805c72a714
Last affected
fd7f13635e6855f6ba3fead0bf37ba2fbf8b68cf
Last affected
fe854ab1f111396458d98fa2ab08c693ce9407e1