Vulnerability Name:

CVE-2021-42340 (CCN-211354)

Assigned:2021-10-14
Published:2021-10-14
Updated:2022-10-27
Summary:The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-772
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-42340

Source: CCN
Type: Apache Web site
Apache Tomcat

Source: XF
Type: UNKNOWN
apache-cve202142340-dos(211354)

Source: CONFIRM
Type: Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10379

Source: MLIST
Type: Mailing List, Patch, Vendor Advisory
[myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340

Source: CCN
Type: Apache Mailing List, 2021/10/14 14:16:34
CVE-2021-42340 Apache Tomcat DoS

Source: MISC
Type: Mailing List, Vendor Advisory
https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E

Source: CCN
Type: oss-sec Mailing List, Thu, 14 Oct 2021 15:27:04 +0100
CVE-2021-42340: Apache Tomcat: DoS via memory leak with WebSocket connections

Source: GENTOO
Type: Third Party Advisory
GLSA-202208-34

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20211104-0001/

Source: DEBIAN
Type: Third Party Advisory
DSA-5009

Source: CCN
Type: IBM Security Bulletin 6518310 (Hardware Management Console)
Vulnerability in Apache Tomcat (CVE-2021-42340) affects HMC

Source: CCN
Type: IBM Security Bulletin 6524338 (Speech to Text)
Apache Tomcat Vulnerability Affects Watson Speech Services

Source: CCN
Type: IBM Security Bulletin 6540600 (Data Risk Manager)
IBM Data Risk Manager is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6541054 (UrbanCode Deploy)
CVE-2021-42340 Apache Tomcat is vulnerable to a denial of service, caused by a memory leak flaw in WebSocket connections.

Source: CCN
Type: IBM Security Bulletin 6541270 (Spectrum Virtualize software)
Vulnerability in Apache Tomcat affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products

Source: CCN
Type: IBM Security Bulletin 6566471 (UrbanCode Build)
IBM UrbanCode Build is affected by CVE-2021-42340

Source: CCN
Type: IBM Security Bulletin 6568787 (Cloud Pak for Security)
Cloud Pak for Security contains packages that have multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6574787 (QRadar SIEM)
IBM QRadar SIEM is vulnerable to using components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6601277 (Rational Build Forge)
IBM Rational Build Forge is affected by Apache Tomcat version used in it. (CVE-2021-42340)

Source: CCN
Type: IBM Security Bulletin 6604981 (UrbanCode Release)
IBM UrbanCode Release is vulnerable to a denial of service due to use of Apache Tomcat CVE-2021-42340.

Source: CCN
Type: Oracle CPUApr2022
Oracle Critical Patch Update Advisory - April 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: Oracle CPUJan2022
Oracle Critical Patch Update Advisory - January 2022

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: N/A
Type: Patch, Third Party Advisory
N/A

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:10.0.0:milestone10:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 10.0.1 and < 10.0.12)
  • OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 8.5.60 and < 8.5.72)
  • OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version >= 9.0.40 and < 9.0.54)

  • Configuration 2:
  • cpe:/a:netapp:hci:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0.0 and <= 8.5.0.2)
  • OR cpe:/a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:* (Version < 23.1)
  • OR cpe:/a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_customer_insights:15.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_customer_insights:16.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:taleo_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:payment_interface:20.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:payment_interface:19.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_eftlink:21.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_data_extractor_for_merchandising:16.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_data_extractor_for_merchandising:15.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_financial_integration:19.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_financial_integration:16.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:14.1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:14.1.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:15.0.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:15.0.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:16.0.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_store_inventory_management:14.0.4.13:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:8.5.60:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.71:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.40:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.53:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:10.0.11:*:*:*:*:*:*:*
  • AND
  • cpe:/a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_risk_manager:2.0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_risk_manager:2.0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.3:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:hardware_management_console:9.2.950.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_risk_manager:2.0.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:7.0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_build:6.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache tomcat 10.0.0 milestone10
    apache tomcat 10.1.0 milestone3
    apache tomcat 10.1.0 milestone4
    apache tomcat 10.1.0 milestone5
    apache tomcat 10.1.0 milestone1
    apache tomcat 10.1.0 milestone2
    apache tomcat *
    apache tomcat *
    apache tomcat *
    netapp hci -
    netapp management services for element software -
    debian debian linux 11.0
    oracle managed file transfer 12.2.1.3.0
    oracle sd-wan edge 9.0
    oracle agile engineering data management 6.2.1.0
    oracle managed file transfer 12.2.1.4.0
    oracle hospitality cruise shipboard property management system 20.1.0
    oracle sd-wan edge 9.1
    oracle communications diameter signaling router *
    oracle big data spatial and graph *
    oracle middleware common libraries and tools 12.2.1.4.0
    oracle retail customer insights 15.0.2
    oracle retail customer insights 16.0.2
    oracle taleo platform *
    oracle payment interface 20.3
    oracle payment interface 19.1
    oracle retail eftlink 21.0.0
    oracle retail data extractor for merchandising 16.0.2
    oracle retail data extractor for merchandising 15.0.2
    oracle retail financial integration 19.0.0
    oracle retail financial integration 16.0.1
    oracle retail store inventory management 14.1.3.5
    oracle retail store inventory management 14.1.3.14
    oracle retail store inventory management 15.0.3.3
    oracle retail store inventory management 15.0.3.8
    oracle retail store inventory management 16.0.3.7
    oracle retail store inventory management 14.0.4.13
    apache tomcat 8.5.60
    apache tomcat 8.5.71
    apache tomcat 9.0.40
    apache tomcat 9.0.53
    apache tomcat 10.0.11
    oracle agile plm framework 9.3.6
    ibm urbancode deploy 6.2.7.3
    ibm qradar security information and event manager 7.3.3
    ibm urbancode deploy 7.0.3.0
    ibm urbancode deploy 7.0.4.0
    ibm data risk manager 2.0.6
    ibm urbancode deploy 7.0.5.2
    ibm urbancode deploy 6.2.7.7
    ibm urbancode deploy 7.1.0.0
    ibm data risk manager 2.0.6.1
    ibm data risk manager 2.0.6.2
    ibm urbancode deploy 6.2.7.4
    ibm urbancode deploy 6.2.7.8
    ibm urbancode deploy 7.0.5.3
    ibm urbancode deploy 6.2.7.9
    ibm urbancode deploy 7.0.5.4
    ibm urbancode deploy 7.1.1.1
    ibm urbancode deploy 7.1.1.2
    ibm qradar security information and event manager 7.4.3 -
    ibm hardware management console 9.2.950.0
    ibm data risk manager 2.0.6.4
    ibm urbancode deploy 6.2.7.5
    ibm urbancode deploy 6.2.7.6
    ibm urbancode deploy 7.0.3.1
    ibm urbancode deploy 7.0.3.2
    ibm urbancode deploy 7.0.3.3
    ibm urbancode deploy 7.0.4.1
    ibm urbancode deploy 7.0.4.2
    ibm urbancode deploy 7.0.5.0
    ibm urbancode deploy 7.0.5.1
    ibm urbancode build 6.1.4.0
    ibm qradar security information and event manager 7.5.0 -