CVE-2024-34750 - Denial of Service (DoS)

Severity: None2024-12-18

Security Advisories

Abstract

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

The Oxygen products incorporate Apache Tomcat as a third-party libraries. This advisory was opened to address the potential impact of this third-party libraries vulnerability.

Affected Products/Versions

ProductSeverityFixed Release Availability
Oxygen Content Fusion v7.0 and olderNone Oxygen Content Fusion 7.1 build 2024100818
Oxygen XML Web Author v26.1.0 and olderNone Oxygen XML Web Author 27.0.0 build 2024112223
Oxygen Feedback v4.1 and olderNone Oxygen Feedback 5.0 build 2024090417

Mitigation

None

Detail

CVE-2024-34750

Severity: Critical

CVSS Score: 7.5

The Apache Tomcat third-party libraries used by Oxygen XML products are an affected version mentioned in CVE-2024-34750 vulnerability description. However, Oxygen products do not have HTTP/2 enabled. For that reason Oxygen products are not affected by this vulnerability.

Starting with Oxygen Content Fusion v7.1 build 2024100818 Apache Tomcat library was updated to a version that fixes this vulnerability.

Starting with Oxygen Feedback v5.0 build 2024090417 Apache Tomcat library was updated to a version that fixes this vulnerability.

Starting with Oxygen Feedback v27.0.0 build 2024112223 Apache Tomcat library was updated to a version that fixes this vulnerability.

List of Security Advisories