Vulnerability Name: CVE-2021-42340 (CCN-211354) Assigned: 2021-10-14 Published: 2021-10-14 Updated: 2022-10-27 Summary: The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-772 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2021-42340 Source: CCN Type: Apache Web siteApache Tomcat Source: XF Type: UNKNOWNapache-cve202142340-dos(211354) Source: CONFIRM Type: Third Party Advisoryhttps://kc.mcafee.com/corporate/index?page=content&id=SB10379 Source: MLIST Type: Mailing List, Patch, Vendor Advisory[myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340 Source: CCN Type: Apache Mailing List, 2021/10/14 14:16:34CVE-2021-42340 Apache Tomcat DoS Source: MISC Type: Mailing List, Vendor Advisoryhttps://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E Source: CCN Type: oss-sec Mailing List, Thu, 14 Oct 2021 15:27:04 +0100CVE-2021-42340: Apache Tomcat: DoS via memory leak with WebSocket connections Source: GENTOO Type: Third Party AdvisoryGLSA-202208-34 Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20211104-0001/ Source: DEBIAN Type: Third Party AdvisoryDSA-5009 Source: CCN Type: IBM Security Bulletin 6518310 (Hardware Management Console)Vulnerability in Apache Tomcat (CVE-2021-42340) affects HMC Source: CCN Type: IBM Security Bulletin 6524338 (Speech to Text)Apache Tomcat Vulnerability Affects Watson Speech Services Source: CCN Type: IBM Security Bulletin 6540600 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6541054 (UrbanCode Deploy)CVE-2021-42340 Apache Tomcat is vulnerable to a denial of service, caused by a memory leak flaw in WebSocket connections. Source: CCN Type: IBM Security Bulletin 6541270 (Spectrum Virtualize software)Vulnerability in Apache Tomcat affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products Source: CCN Type: IBM Security Bulletin 6566471 (UrbanCode Build)IBM UrbanCode Build is affected by CVE-2021-42340 Source: CCN Type: IBM Security Bulletin 6568787 (Cloud Pak for Security)Cloud Pak for Security contains packages that have multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6574787 (QRadar SIEM)IBM QRadar SIEM is vulnerable to using components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6601277 (Rational Build Forge)IBM Rational Build Forge is affected by Apache Tomcat version used in it. (CVE-2021-42340) Source: CCN Type: IBM Security Bulletin 6604981 (UrbanCode Release)IBM UrbanCode Release is vulnerable to a denial of service due to use of Apache Tomcat CVE-2021-42340. Source: CCN Type: Oracle CPUApr2022Oracle Critical Patch Update Advisory - April 2022 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuapr2022.html Source: CCN Type: Oracle CPUJan2022Oracle Critical Patch Update Advisory - January 2022 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2022.html Source: CCN Type: Oracle CPUJul2022Oracle Critical Patch Update Advisory - July 2022 Source: N/A Type: Patch, Third Party AdvisoryN/A Vulnerable Configuration: Configuration 1 :cpe:/a:apache:tomcat:10.0.0:milestone10:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 10.0.1 and < 10.0.12) OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 8.5.60 and < 8.5.72) OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 9.0.40 and < 9.0.54) Configuration 2 :cpe:/a:netapp:hci:-:*:*:*:*:*:*:* OR cpe:/a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:* OR cpe:/a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0.0 and <= 8.5.0.2) OR cpe:/a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:* (Version < 23.1) OR cpe:/a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_customer_insights:15.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_customer_insights:16.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:taleo_platform:*:*:*:*:*:*:*:* OR cpe:/a:oracle:payment_interface:20.3:*:*:*:*:*:*:* OR cpe:/a:oracle:payment_interface:19.1:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_eftlink:21.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_data_extractor_for_merchandising:16.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_data_extractor_for_merchandising:15.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_financial_integration:19.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_financial_integration:16.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:14.1.3.5:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:14.1.3.14:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:15.0.3.3:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:15.0.3.8:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:16.0.3.7:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_store_inventory_management:14.0.4.13:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:8.5.60:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.5.71:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:9.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:9.0.53:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:10.0.11:*:*:*:*:*:*:* AND cpe:/a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.8:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.5.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.9:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.5.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.3:-:*:*:*:*:*:* OR cpe:/a:ibm:hardware_management_console:9.2.950.0:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.5:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.2.7.6:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.5.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:7.0.5.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_build:6.1.4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:* Denotes that component is vulnerable BACK
apache tomcat 10.0.0 milestone10
apache tomcat 10.1.0 milestone3
apache tomcat 10.1.0 milestone4
apache tomcat 10.1.0 milestone5
apache tomcat 10.1.0 milestone1
apache tomcat 10.1.0 milestone2
apache tomcat *
apache tomcat *
apache tomcat *
netapp hci -
netapp management services for element software -
debian debian linux 11.0
oracle managed file transfer 12.2.1.3.0
oracle sd-wan edge 9.0
oracle agile engineering data management 6.2.1.0
oracle managed file transfer 12.2.1.4.0
oracle hospitality cruise shipboard property management system 20.1.0
oracle sd-wan edge 9.1
oracle communications diameter signaling router *
oracle big data spatial and graph *
oracle middleware common libraries and tools 12.2.1.4.0
oracle retail customer insights 15.0.2
oracle retail customer insights 16.0.2
oracle taleo platform *
oracle payment interface 20.3
oracle payment interface 19.1
oracle retail eftlink 21.0.0
oracle retail data extractor for merchandising 16.0.2
oracle retail data extractor for merchandising 15.0.2
oracle retail financial integration 19.0.0
oracle retail financial integration 16.0.1
oracle retail store inventory management 14.1.3.5
oracle retail store inventory management 14.1.3.14
oracle retail store inventory management 15.0.3.3
oracle retail store inventory management 15.0.3.8
oracle retail store inventory management 16.0.3.7
oracle retail store inventory management 14.0.4.13
apache tomcat 8.5.60
apache tomcat 8.5.71
apache tomcat 9.0.40
apache tomcat 9.0.53
apache tomcat 10.0.11
oracle agile plm framework 9.3.6
ibm urbancode deploy 6.2.7.3
ibm qradar security information and event manager 7.3.3
ibm urbancode deploy 7.0.3.0
ibm urbancode deploy 7.0.4.0
ibm data risk manager 2.0.6
ibm urbancode deploy 7.0.5.2
ibm urbancode deploy 6.2.7.7
ibm urbancode deploy 7.1.0.0
ibm data risk manager 2.0.6.1
ibm data risk manager 2.0.6.2
ibm urbancode deploy 6.2.7.4
ibm urbancode deploy 6.2.7.8
ibm urbancode deploy 7.0.5.3
ibm urbancode deploy 6.2.7.9
ibm urbancode deploy 7.0.5.4
ibm urbancode deploy 7.1.1.1
ibm urbancode deploy 7.1.1.2
ibm qradar security information and event manager 7.4.3 -
ibm hardware management console 9.2.950.0
ibm data risk manager 2.0.6.4
ibm urbancode deploy 6.2.7.5
ibm urbancode deploy 6.2.7.6
ibm urbancode deploy 7.0.3.1
ibm urbancode deploy 7.0.3.2
ibm urbancode deploy 7.0.3.3
ibm urbancode deploy 7.0.4.1
ibm urbancode deploy 7.0.4.2
ibm urbancode deploy 7.0.5.0
ibm urbancode deploy 7.0.5.1
ibm urbancode build 6.1.4.0
ibm qradar security information and event manager 7.5.0 -