View all vulnerabilities

CVE-2024-34750

Apache Tomcat - Denial of Service

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100.Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
org.apache.tomcat.embed:tomcat-embed-core >= 11.0.0-M1 < 11.0.0-M21; org.apache.tomcat.embed:tomcat-embed-core >= 10.1.0-M1 < 10.1.25; org.apache.tomcat.embed:tomcat-embed-core >= 9.0.0-M1 < 9.0.90; org.apache.tomcat:tomcat-coyote >= 11.0.0-M1 < 11.0.0-M21; org.apache.tomcat:tomcat-coyote >= 10.1.0-M1 < 10.1.25; org.apache.tomcat:tomcat-coyote >= 9.0.0-M1 < 9.0.90; org.apache.tomcat:tomcat-coyote >= 8.5.0; org.apache.tomcat.embed:tomcat-embed-core >= 8.5.0
Severity
High
Ecosystem
Publish Date
July 3, 2024
Modified Date
August 8, 2025