CVE-2016-4970
netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).
handler/ssl/OpenSslEngine.java en Netty 4.0.x en versiones anteriores a 4.0.37.Final y 4.1.x en versiones anteriores a 4.1.1.Final permite a los atacantes remotos provocar una denegaciĆ³n de servicio (bucle infinito).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2016-05-24 CVE Reserved
- 2017-04-13 CVE Published
- 2024-07-14 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/96540 | Third Party Advisory | |
https://lists.apache.org/thread.html/afaa5860e3a6d327eb96c3d82cbd2f5996de815a16854ed1ad310144%40%3Ccommits.cassandra.apache.org%3E | Mailing List | |
https://wiki.opendaylight.org/view/Security_Advisories | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/netty/netty/pull/5364 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://netty.io/news/2016/06/07/4-0-37-Final.html | 2023-11-07 | |
http://netty.io/news/2016/06/07/4-1-1-Final.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-0179.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2017-1097.html | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1343616 | 2020-07-28 | |
https://access.redhat.com/security/cve/CVE-2016-4970 | 2020-07-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netty Search vendor "Netty" | Netty Search vendor "Netty" for product "Netty" | >= 4.0.20 < 4.0.37 Search vendor "Netty" for product "Netty" and version " >= 4.0.20 < 4.0.37" | - |
Affected
| ||||||
Netty Search vendor "Netty" | Netty Search vendor "Netty" for product "Netty" | >= 4.1.0 < 4.1.1 Search vendor "Netty" for product "Netty" and version " >= 4.1.0 < 4.1.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Data Grid Search vendor "Redhat" for product "Jboss Data Grid" | 7.1 Search vendor "Redhat" for product "Jboss Data Grid" and version "7.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Middleware Text-only Advisories Search vendor "Redhat" for product "Jboss Middleware Text-only Advisories" | 1.0 Search vendor "Redhat" for product "Jboss Middleware Text-only Advisories" and version "1.0" | middleware |
Affected
| ||||||
Apache Search vendor "Apache" | Cassandra Search vendor "Apache" for product "Cassandra" | 3.11.4 Search vendor "Apache" for product "Cassandra" and version "3.11.4" | - |
Affected
|