SB2024062415 - Multiple vulnerabilities in Undertow
Published: June 24, 2024 Updated: July 26, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2024-6162)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when handling url-encoded request path information. A remote attacker can send a specially crafted HTTP request to the application and perform a denial of service (DoS) attack.
2) Resource exhaustion (CVE-ID: CVE-2024-27316)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling HTTP/2 requests. A remote attacker can send specially crafted HTTP/2 requests to the server and perform a denial of service (DoS) attack.
3) Resource exhaustion (CVE-ID: CVE-2023-5685)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in NotifierState, when the chain of notifier states becomes problematically large. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://access.redhat.com/security/cve/CVE-2024-6162
- https://bugzilla.redhat.com/show_bug.cgi?id=2293069
- https://github.com/undertow-io/undertow/releases/tag/2.3.14.Final
- https://github.com/undertow-io/undertow/releases/tag/2.2.33.Final
- https://github.com/undertow-io/undertow/releases/tag/2.2.33.Final"
- https://github.com/undertow-io/undertow/releases/tag/2.2.33.Final</a></p><p>
- https://github.com/undertow-io/undertow/releases/tag/2.3.14.Final</p><p><br></p>