Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1300

Опубликовано: 06 фев. 2024
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

A vulnerability in the Eclipse Vert.x toolkit causes a memory leak in TCP servers configured with TLS and SNI support. When processing an unknown SNI server name assigned the default certificate instead of a mapped certificate, the SSL context is erroneously cached in the server name map, leading to memory exhaustion. This flaw allows attackers to send TLS client hello messages with fake server names, triggering a JVM out-of-memory error.

Отчет

This affects only TLS servers with SNI enabled.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2vertx-coreNot affected
OpenShift Serverlessvertx-coreNot affected
Red Hat AMQ Broker 7vertx-coreNot affected
Red Hat build of Apache Camel for Spring Boot 3vertx-coreWill not fix
Red Hat Build of Keycloakvertx-coreAffected
Red Hat build of OptaPlanner 8vertx-coreWill not fix
Red Hat build of Quarkusio.vertx/vertx-coreWill not fix
Red Hat Data Grid 8vertx-coreNot affected
Red Hat Fuse 7vertx-coreNot affected
Red Hat Integration Camel K 1vertx-coreWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1392->CWE-401
https://bugzilla.redhat.com/show_bug.cgi?id=2263139io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support

EPSS

Процентиль: 27%
0.00098
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
почти 2 года назад

A vulnerability in the Eclipse Vert.x toolkit causes a memory leak in TCP servers configured with TLS and SNI support. When processing an unknown SNI server name assigned the default certificate instead of a mapped certificate, the SSL context is erroneously cached in the server name map, leading to memory exhaustion. This flaw allows attackers to send TLS client hello messages with fake server names, triggering a JVM out-of-memory error.

CVSS3: 5.4
github
почти 2 года назад

Eclipse Vert.x vulnerable to a memory leak in TCP servers

CVSS3: 5.4
fstec
около 2 лет назад

Уязвимость набора инструментов Eclipse Vert.x, связанная с утечкой памяти, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00098
Низкий

5.4 Medium

CVSS3