// For flags

CVE-2013-4210

Remoting: DoS by file descriptor exhaustion

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, and other products allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.

La clase org.jboss.remoting.transport.socket.ServerThread en Red Hat JBoss Remoting para Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, y otros productos, permite a atacantes remotos causar denegación de servicio (consumo de descriptores de fichero) a través de vectores no especificados.

Red Hat JBoss Operations Network is a middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-09-30 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Jboss Enterprise Application Platform
Search vendor "Redhat" for product "Jboss Enterprise Application Platform"
5.0.0
Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.0.0"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Brms Platform
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform"
5.2.0
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" and version "5.2.0"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Brms Platform
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform"
5.3.0
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" and version "5.3.0"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Soa Platform
Search vendor "Redhat" for product "Jboss Enterprise Soa Platform"
5.3.0
Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.3.0"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Soa Platform
Search vendor "Redhat" for product "Jboss Enterprise Soa Platform"
5.3.1
Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.3.1"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Web Platform
Search vendor "Redhat" for product "Jboss Enterprise Web Platform"
5.2.0
Search vendor "Redhat" for product "Jboss Enterprise Web Platform" and version "5.2.0"
-
Affected