Vulnerability Name:

CVE-2021-30639 (CCN-205212)

Assigned:2021-07-12
Published:2021-07-12
Updated:2022-10-27
Summary:A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-755
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-30639

Source: CCN
Type: Apache Web site
Apache Tomcat

Source: XF
Type: UNKNOWN
apache-cve202130639-dos(205212)

Source: CONFIRM
Type: Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10366

Source: MLIST
Type: Mailing List, Vendor Advisory
[tomcat-dev] 20210712 RE: [SECURITY] CVE-2021-30639 Apache Tomcat DoS

Source: MLIST
Type: Mailing List, Vendor Advisory
[tomcat-users] 20210712 RE: [SECURITY] CVE-2021-30639 Apache Tomcat DoS

Source: CCN
Type: Apache Mailing List, 2021/07/12 13:03:15
CVE-2021-30639 Apache Tomcat DoS

Source: MISC
Type: Mailing List, Vendor Advisory
https://lists.apache.org/thread.html/rd84fae1f474597bdf358f5bdc0a5c453c507bd527b83e8be6b5ea3f4%40%3Cannounce.tomcat.apache.org%3E

Source: GENTOO
Type: Third Party Advisory
GLSA-202208-34

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210827-0007/

Source: CCN
Type: IBM Security Bulletin 6491087 (App Connect Professional)
App Connect Professional is affected by Apache Tomcat vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 6497499 (Data Risk Manager)
IBM Data Risk Manager is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6550778 (UrbanCode Release)
IBM UrbanCode Release is affected by CVE-2021-30639

Source: CCN
Type: IBM Security Bulletin 6554536 (UrbanCode Build)
IBM UrbanCode Build is affected by CVE-2021-30639

Source: CCN
Type: Oracle CPUJan2022
Oracle Critical Patch Update Advisory - January 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:10.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.44:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.64:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:* (Version < 5.10.0)
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*
  • OR cpe:/a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:* (Version < 23.1)

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:8.5.64:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.44:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.0.4:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:app_connect:7.5.3.0:*:*:*:professional:*:*:*
  • OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache tomcat 10.0.4
    apache tomcat 9.0.44
    apache tomcat 10.0.3
    apache tomcat 8.5.64
    mcafee epolicy orchestrator 5.10.0 update_1
    mcafee epolicy orchestrator 5.10.0 update_2
    mcafee epolicy orchestrator 5.10.0 update_3
    mcafee epolicy orchestrator 5.10.0 update_4
    mcafee epolicy orchestrator 5.10.0 update_5
    mcafee epolicy orchestrator 5.10.0 update_6
    mcafee epolicy orchestrator 5.10.0 -
    mcafee epolicy orchestrator *
    mcafee epolicy orchestrator 5.10.0 update_7
    mcafee epolicy orchestrator 5.10.0 update_8
    mcafee epolicy orchestrator 5.10.0 update_9
    mcafee epolicy orchestrator 5.10.0 update_10
    oracle big data spatial and graph *
    apache tomcat 8.5.64
    apache tomcat 9.0.44
    apache tomcat 10.0.3
    apache tomcat 10.0.4
    ibm app connect 7.5.3.0
    ibm data risk manager 2.0.6