{ "id": "CVE-2024-23672", "sourceIdentifier": "security@apache.org", "published": "2024-03-13T16:15:29.287", "lastModified": "2025-02-13T18:17:03.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue." }, { "lang": "es", "value": "Denegaci\u00f3n de servicio mediante vulnerabilidad de limpieza incompleta en Apache Tomcat. Los clientes de WebSocket pod\u00edan mantener abiertas las conexiones de WebSocket, lo que generaba un mayor consumo de recursos. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.0-M16, desde 10.1.0-M1 hasta 10.1.18, desde 9.0. 0-M1 hasta 9.0.85, desde 8.5.0 hasta 8.5.98. Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.0-M17, 10.1.19, 9.0.86 u 8.5.99, que solucionan el problema." } ], "metrics": { "cvssMetricV31": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 6.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 2.8, "impactScore": 3.4 } ] }, "weaknesses": [ { "source": "security@apache.org", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-459" } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/13/4", "source": "security@apache.org" }, { "url": "https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f", "source": "security@apache.org" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html", "source": "security@apache.org" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/", "source": "security@apache.org" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/", "source": "security@apache.org" }, { "url": "https://security.netapp.com/advisory/ntap-20240402-0002/", "source": "security@apache.org" }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/13/4", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B/", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55/", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://security.netapp.com/advisory/ntap-20240402-0002/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }