The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Epolicy Orchestrator Subscribe
Oncommand System Manager Subscribe
Opensuse Subscribe
Agile Engineering Data Management Subscribe
Agile Plm Subscribe
Blockchain Platform Subscribe
Commerce Guided Search Subscribe
Communications Cloud Native Core Policy Subscribe
Communications Instant Messaging Server Subscribe
Fmw Platform Subscribe
Instantis Enterprisetrack Subscribe
Managed File Transfer Subscribe
Mysql Enterprise Monitor Subscribe
Siebel Ui Framework Subscribe
Workload Manager Subscribe
Enterprise Linux Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Subscribe
Openshift Application Runtimes Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2286-1 tomcat8 security update
Github GHSA Github GHSA GHSA-m7jv-hq7h-mq7c Infinite Loop in Apache Tomcat
Ubuntu USN Ubuntu USN USN-4448-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-4596-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html cve-icon cve-icon
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E cve-icon
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7 cve-icon
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105 cve-icon
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57 cve-icon
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37 cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10332 cve-icon cve-icon
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-13935 cve-icon
https://security.netapp.com/advisory/ntap-20200724-0003/ cve-icon cve-icon
https://usn.ubuntu.com/4448-1/ cve-icon cve-icon
https://usn.ubuntu.com/4596-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-13935 cve-icon
https://www.debian.org/security/2020/dsa-4727 cve-icon cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T12:32:14.307Z

Reserved: 2020-06-08T00:00:00

Link: CVE-2020-13935

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-14T15:15:11.070

Modified: 2024-11-21T05:02:10.907

Link: CVE-2020-13935

cve-icon Redhat

Severity : Important

Publid Date: 2020-07-15T00:00:00Z

Links: CVE-2020-13935 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses