CVE-2018-8037
Published: 2 August 2018
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
Notes
Author | Note |
---|---|
debian | Vulnerable code only present in 8.5.5 to 8.5.31 in 8.x series |
Priority
Status
Package | Release | Status |
---|---|---|
tomcat8 Launchpad, Ubuntu, Debian |
bionic |
Released
(8.5.39-1ubuntu1~18.04.1)
|
cosmic |
Not vulnerable
(8.5.32-1ubuntu2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(8.5.32-1)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://svn.apache.org/r1833907 upstream: https://svn.apache.org/r1833826 upstream: https://svn.apache.org/r1833832 upstream: https://svn.apache.org/r1837531 |
||
tomcat8.0 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |