It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | tomcat6 | 2016-03-10 16:30 | ALAS-2016-656 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.0 | AV:N/AC:L/Au:N/C:N/I:N/A:P |
NVD | CVSSv2 | 7.8 | AV:N/AC:L/Au:N/C:N/I:N/A:C |