Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wNmo4LWhndjUtbTM1Z800Iw
Uncontrolled Resource Consumption in jboss-remoting
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Permalink: https://github.com/advisories/GHSA-p6j8-hgv5-m35gJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wNmo4LWhndjUtbTM1Z800Iw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-p6j8-hgv5-m35g, CVE-2020-35510
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-35510
- https://bugzilla.redhat.com/show_bug.cgi?id=1905796
- https://github.com/advisories/GHSA-p6j8-hgv5-m35g
Affected Packages
maven:org.jboss.remoting:jboss-remoting
Dependent packages: 140Dependent repositories: 578
Downloads:
Affected Version Ranges: <= 5.0.19.Final
Fixed in: 5.0.20.Final
All affected versions: 2.2.4, 2.5.1, 2.5.2, 2.5.3, 5.0.1-0.Final, 5.0.1-1.Final, 5.0.1-2.Final, 5.0.1-3.Final, 5.0.1-4.Final, 5.0.1-5.Final, 5.0.1-6.Final, 5.0.1-7.Final, 5.0.1-8.Final, 5.0.1-9.Final
All unaffected versions: