Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-47535

Опубликовано: 12 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nettynot-affectedpackage

Примечания

  • https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv

  • https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3 (netty-4.1.115.Final)

EPSS

Процентиль: 42%
0.00198
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 года назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

CVSS3: 5.5
redhat
около 1 года назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

CVSS3: 5.5
nvd
около 1 года назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

suse-cvrf
около 1 года назад

Security update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative

CVSS3: 5.5
github
около 1 года назад

Denial of Service attack on windows app using netty

EPSS

Процентиль: 42%
0.00198
Низкий