#VU63127 Resource exhaustion in Netty


Published: 2022-05-12

Vulnerability identifier: #VU63127

Vulnerability risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-37136

CWE-ID: CWE-400

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Netty
Universal components / Libraries / Libraries used by multiple products

Vendor: Netty project

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in Bzip2 decompression decoder function. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Netty: 4.1 - 4.1.67


CPE

External links
http://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv
http://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E
http://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E
http://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E
http://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E
http://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E
http://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E
http://www.oracle.com/security-alerts/cpujan2022.html
http://security.netapp.com/advisory/ntap-20220210-0012/
http://www.oracle.com/security-alerts/cpuapr2022.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability