Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-5971

Опубликовано: 08 июл. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

Отчет

The identified vulnerability in Undertow, where chunked responses fail to terminate properly under Java 17 with TLSv1.3, represents a significant security concern due to its potential for uncontrolled resource consumption and denial of service (DoS) attacks. This issue arises from Undertow's mishandling of chunked response termination after initial data flushing, leading to clients waiting indefinitely for completion signals that are not sent. Such behavior could be exploited by malicious actors to exhaust server resources, resulting in service degradation or unavailability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3undertowAffected
Red Hat build of Apache Camel - HawtIO 4undertowAffected
Red Hat Build of KeycloakundertowAffected
Red Hat build of Quarkusio.quarkus/quarkus-undertowAffected
Red Hat Data Grid 8undertowNot affected
Red Hat Fuse 7undertowAffected
Red Hat Integration Camel K 1undertowWill not fix
Red Hat JBoss Data Grid 7undertowOut of support scope
Red Hat JBoss Enterprise Application Platform 7undertow-coreNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packundertow-coreNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-674
https://bugzilla.redhat.com/show_bug.cgi?id=2292211undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket

EPSS

Процентиль: 88%
0.03699
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

CVSS3: 7.5
nvd
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

CVSS3: 7.5
debian
больше 1 года назад

A vulnerability was found in Undertow, where the chunked response hang ...

CVSS3: 7.5
github
больше 1 года назад

Undertow Denial of Service vulnerability

EPSS

Процентиль: 88%
0.03699
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-5971