Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-5971

Опубликовано: 08 июл. 2024
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowfixed2.3.18-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2292211

  • https://github.com/advisories/GHSA-xpp6-8r3j-ww43

  • https://issues.redhat.com/browse/UNDERTOW-2413

EPSS

Процентиль: 88%
0.03699
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

CVSS3: 7.5
redhat
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

CVSS3: 7.5
nvd
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

CVSS3: 7.5
github
больше 1 года назад

Undertow Denial of Service vulnerability

EPSS

Процентиль: 88%
0.03699
Низкий