CVE-2019-10072
Denial of Service vulnerability in tomcat-embed-core (Maven)

Denial of Service No known exploit Fixable By Resolved Security

What is CVE-2019-10072 About?

This vulnerability is a Denial of Service (DoS) in Apache Tomcat related to incomplete HTTP/2 connection window exhaustion handling. Attackers can prevent the server from sending WINDOW_UPDATE messages, leading to thread exhaustion and service disruption. Exploitation is relatively straightforward by manipulating HTTP/2 flow control.

Affected Software

  • org.apache.tomcat.embed:tomcat-embed-core
    • >8.5.0, <8.5.41
    • >9.0.0.M1, <9.0.20

Technical Details

The vulnerability is a bypass of a previous fix for CVE-2019-0199, specifically impacting HTTP/2 connection window management. In Apache Tomcat, when processing HTTP/2 requests, clients can intentionally refrain from sending WINDOW_UPDATE messages for the connection window (stream 0). This action prevents the server from updating its send window, leading to server-side threads blocking indefinitely as they wait for an increased window size. Eventually, all available threads become exhausted, resulting in a Denial of Service condition for the server.

What is the Impact of CVE-2019-10072?

Successful exploitation may allow attackers to exhaust server resources, cause the application to become unresponsive, and lead to a complete denial of service for legitimate users.

What is the Exploitability of CVE-2019-10072?

Exploitation of this vulnerability involves sending specific HTTP/2 traffic to the server. The complexity is moderate, requiring an understanding of HTTP/2 flow control mechanisms. No authentication is required, as the attack targets the connection handling itself. This is a remote exploitation scenario, requiring network access to the vulnerable Tomcat instance. The primary risk factor is direct exposure of the HTTP/2 endpoint on the vulnerable server, allowing malicious clients to initiate and maintain connections without proper flow control.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CVE-2019-10072?

A Fix by Resolved Security Exists!
Fix open-source vulnerabilities without upgrading your dependencies.

About the Fix from Resolved Security

None

Available Upgrade Options

  • org.apache.tomcat.embed:tomcat-embed-core
    • >8.5.0, <8.5.41 → Upgrade to 8.5.41
  • org.apache.tomcat.embed:tomcat-embed-core
    • >9.0.0.M1, <9.0.20 → Upgrade to 9.0.20

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CVE-2019-10072?

Similar Vulnerabilities: CVE-2019-10081 , CVE-2019-0199 , CVE-2015-5182 , CVE-2014-0050 , CVE-2019-12411