Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11612

Опубликовано: 31 янв. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.

A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.

Отчет

In OpenShift Container Platform end users don't have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it. Third party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn't necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. Red Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release. More information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7karaf-transaction-manager-narayanaAffected
Red Hat JBoss A-MQ 6nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 5nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 6nettyOut of support scope
Red Hat JBoss Fuse 6nettyOut of support scope
Red Hat JBoss Operations Network 3nettyOut of support scope
Red Hat OpenShift Application RuntimesnettyAffected
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-elasticsearch5Will not fix
Red Hat OpenShift Container Platform 4openshift4/ose-logging-elasticsearch5Will not fix
AMQ Clients 2.y for RHEL 6qpid-cppFixedRHSA-2020:260517.06.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1816216netty: compression/decompression codecs don't enforce limits on buffer allocation sizes

EPSS

Процентиль: 84%
0.02048
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.

CVSS3: 7.5
nvd
почти 6 лет назад

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.

CVSS3: 7.5
debian
почти 6 лет назад

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memo ...

CVSS3: 7.5
github
больше 5 лет назад

Denial of Service in Netty

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость реализации класса ZlibDecoders сетевого программного средства Netty, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 84%
0.02048
Низкий

7.5 High

CVSS3