{"id":"USN-4596-1","summary":"tomcat9 vulnerabilities","details":"It was discovered that Tomcat did not properly manage HTTP/2 streams. An \nattacker could possibly use this to cause Tomcat to consume resources, \nresulting in a denial of service. (CVE-2020-11996)\n\nIt was discovered that Tomcat did not properly release the HTTP/1.1 \nprocessor after the upgrade to HTTP/2. An attacker could possibly use this\nto generate an OutOfMemoryException, resulting in a denial of service. \n(CVE-2020-13934)\n\nIt was discovered that Tomcat did not properly validate the payload length\nin a WebSocket frame. An attacker could possibly use this to trigger an\ninfinite loop, resulting in a denial of service. (CVE-2020-13935)\n\nIt was discovered that Tomcat did not properly deserialize untrusted data.\nAn attacker could possibly use this issue to execute arbitrary code.\n(CVE-2020-9484)\n","modified":"2026-02-10T04:41:58Z","published":"2020-10-21T13:55:35Z","related":["UBUNTU-CVE-2020-11996","UBUNTU-CVE-2020-13934","UBUNTU-CVE-2020-13935","UBUNTU-CVE-2020-9484"],"upstream":["CVE-2020-11996","CVE-2020-13934","CVE-2020-13935","CVE-2020-9484","UBUNTU-CVE-2020-11996","UBUNTU-CVE-2020-13934","UBUNTU-CVE-2020-13935","UBUNTU-CVE-2020-9484"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4596-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-9484"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11996"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13934"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13935"}],"affected":[{"package":{"name":"tomcat9","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/tomcat9@9.0.31-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.31-1ubuntu0.1"}]}],"versions":["9.0.24-1","9.0.27-1","9.0.31-1"],"ecosystem_specific":{"binaries":[{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"libtomcat9-embed-java"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"libtomcat9-java"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9-admin"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9-common"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9-docs"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9-examples"},{"binary_version":"9.0.31-1ubuntu0.1","binary_name":"tomcat9-user"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2020-9484","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-11996","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-13934","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-13935","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4596-1.json"}}],"schema_version":"1.7.3"}