Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24970

Опубликовано: 10 фев. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

A flaw was found in Netty's SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.

Отчет

This vulnerability in Netty's SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsio.netty/netty-handlerAffected
A-MQ Clients 2io.netty/netty-handlerAffected
Cryostat 3io.netty/netty-handlerAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Affected
OpenShift Serverlessio.netty/netty-handlerAffected
Red Hat AMQ Broker 7io.netty/netty-handlerAffected
Red Hat build of Apicurio Registry 2io.netty/netty-handlerAffected
Red Hat build of Apicurio Registry 3io.netty/netty-handlerAffected
Red Hat build of Debezium 2io.netty/netty-handlerWill not fix
Red Hat build of OptaPlanner 8io.netty/netty-handlerAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2344787io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

EPSS

Процентиль: 30%
0.00108
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

CVSS3: 7.5
nvd
5 месяцев назад

Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

CVSS3: 7.5
debian
5 месяцев назад

Netty, an asynchronous, event-driven network application framework, ha ...

CVSS3: 7.5
github
5 месяцев назад

SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

CVSS3: 7.5
fstec
5 месяцев назад

Уязвимость сетевого программного средства Netty, связанная с неправильной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 30%
0.00108
Низкий

7.5 High

CVSS3