CVE-2024-34750 - Denial of Service (DoS)
Severity: None2025-03-11
Abstract
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
The Oxygen products incorporate Apache Tomcat as a third-party libraries. This advisory was opened to address the potential impact of this third-party libraries vulnerability.
Affected Products/Versions
Product | Severity | Fixed Release Availability |
Oxygen Content Fusion v7.0 and older | None | Oxygen Content Fusion 7.1 build 2024100818 |
Oxygen XML Web Author v26.1.0 and older | None | Oxygen XML Web Author 27.0.0 build 2024112223 |
Oxygen Feedback v4.1 and older | None | Oxygen Feedback 5.0 build 2024090417 |
Detail
CVE-2024-34750
Severity: Critical
CVSS Score: 7.5
The Apache Tomcat third-party libraries used by Oxygen XML products are an affected version mentioned in CVE-2024-34750 vulnerability description. However, Oxygen products do not have HTTP/2 enabled. For that reason Oxygen products are not affected by this vulnerability.
Starting with Oxygen Content Fusion v7.1 build 2024100818 Apache Tomcat library was updated to a version that fixes this vulnerability.
Starting with Oxygen Feedback v5.0 build 2024090417 Apache Tomcat library was updated to a version that fixes this vulnerability.
Starting with Oxygen Feedback v27.0.0 build 2024112223 Apache Tomcat library was updated to a version that fixes this vulnerability.