Resource exhaustion in Wildfly - CVE-2016-9589
Published: March 14, 2018
Vulnerability identifier: #VU11069
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-9589
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Wildfly
Wildfly
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists in the Undertow component due to improper resource management. A remote attacker can use a cache of seen HTTP headers that is kept in persistent connections, send a specially crafted input, consume excessive amounts of memory resources and cause the service to crash.
The weakness exists in the Undertow component due to improper resource management. A remote attacker can use a cache of seen HTTP headers that is kept in persistent connections, send a specially crafted input, consume excessive amounts of memory resources and cause the service to crash.
How to mitigate CVE-2016-9589
Update to version 11.0.0.Beta1 or later.