{"id":"CVE-2024-38286","details":"Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89.\n\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.\n\n\n\nApache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.","aliases":["BIT-tomcat-2024-38286","GHSA-7jqf-v358-p8g7"],"modified":"2026-03-27T08:59:21.919348582Z","published":"2024-11-07T08:15:13.007Z","related":["CGA-cp44-v76p-p55r","SUSE-SU-2024:3510-1","SUSE-SU-2026:1058-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241101-0010/"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/09/23/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"706a395be7c34414d04739de69bde986661976ec"},{"fixed":"65977c7d1da9b6016e2b19de06c3be7373f40859"},{"introduced":"934df02dc68e72b95a38f372017f1b89b0d13a76"},{"fixed":"a0038178b617423537dc66b2f516c53da7093421"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38286.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}