CVE-2016-9589
wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
Undertow en Red Hat wildfly, en versiones anteriores a la 11.0.0.Beta1, es vulnerable a un agotamiento de recursos, lo cual resulta en una denegación de servicio (DoS). Undertow mantiene una caché de las cabeceras HTTP vistas en conexiones persistentes. Se ha descubierto que esta caché puede ser explotada fácilmente para llenar la memoria con elementos no utilizados, hasta "max-headers" (200 por defecto) * "max-header-size" (1MB por defecto) por conexión TCP activa.
It was found that JBoss EAP 7 Header Cache was inefficient. An attacker could use this flaw to cause a denial of service attack.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-11-23 CVE Reserved
- 2017-03-23 CVE Published
- 2023-09-12 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/97060 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0830.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0831.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0832.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0834.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0876.html | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:0872 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:0873 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:3454 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:3455 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:3456 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2017:3458 | 2019-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1404782 | 2017-12-13 | |
https://access.redhat.com/security/cve/CVE-2016-9589 | 2017-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Wildfly Application Server Search vendor "Redhat" for product "Jboss Wildfly Application Server" | <= 10.1.0 Search vendor "Redhat" for product "Jboss Wildfly Application Server" and version " <= 10.1.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Wildfly Application Server Search vendor "Redhat" for product "Jboss Wildfly Application Server" | 11.0.0 Search vendor "Redhat" for product "Jboss Wildfly Application Server" and version "11.0.0" | alpha1 |
Affected
|