Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14cHA2LThyM2otd3c0M84AA9oi
Undertow Denial of Service vulnerability
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n
termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14cHA2LThyM2otd3c0M84AA9oi
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 5 months ago
Updated: about 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-xpp6-8r3j-ww43, CVE-2024-5971
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-5971
- https://access.redhat.com/security/cve/CVE-2024-5971
- https://bugzilla.redhat.com/show_bug.cgi?id=2292211
- https://access.redhat.com/errata/RHSA-2024:4392
- https://access.redhat.com/errata/RHSA-2024:4884
- https://access.redhat.com/errata/RHSA-2024:5143
- https://access.redhat.com/errata/RHSA-2024:5144
- https://access.redhat.com/errata/RHSA-2024:5145
- https://access.redhat.com/errata/RHSA-2024:5147
- https://access.redhat.com/errata/RHSA-2024:6508
- https://access.redhat.com/errata/RHSA-2024:6883
- https://github.com/undertow-io/undertow/pull/1638
- https://github.com/undertow-io/undertow/pull/1640
- https://github.com/undertow-io/undertow/pull/1641
- https://issues.redhat.com/browse/UNDERTOW-2413
- https://github.com/advisories/GHSA-xpp6-8r3j-ww43
Blast Radius: 27.9
Affected Packages
maven:io.undertow:undertow-core
Dependent packages: 912Dependent repositories: 5,259
Downloads:
Affected Version Ranges: < 2.2.34.Final, >= 2.3.0.Alpha1, < 2.3.15.Final
Fixed in: 2.2.34.Final, 2.3.15.Final
All affected versions: 2.2.3-0.Final, 2.2.3-1.Final, 2.2.3-2.Final, 2.2.3-3.Final, 2.3.1-0.Final, 2.3.1-1.Final, 2.3.1-2.Final, 2.3.1-3.Final, 2.3.1-4.Final
All unaffected versions: