First published: Thu Dec 15 2011(Updated: )
JBoss Web will enter into an infinite loop when a surrogate pair character is placed at the boundary of an internal buffer. A remote attacker could exploit this flaw to trigger a denial-of-service attack against a JBoss Web server that is hosting applications with UTF-8 character encoding enabled, or that will include user-supplied UTF-8 strings in a response.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Communications Platform | <=5.1 | |
redhat jboss enterprise application platform | <=5.1.2 | |
Red Hat JBoss Enterprise BRMS Platform | <=5.1.0 | |
Red Hat JBoss Enterprise Web Platform | <=5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4610 has a moderate severity rating due to its potential to cause denial-of-service conditions.
To mitigate CVE-2011-4610, update your JBoss server to a version that is not affected, preferably above 5.1.2.
CVE-2011-4610 facilitates a denial-of-service attack by causing JBoss Web to enter an infinite loop.
CVE-2011-4610 affects Red Hat JBoss Communications Platform versions up to 5.1, and JBoss Enterprise Application Platform up to 5.1.2.
Currently, the best workaround for CVE-2011-4610 is to avoid encoding UTF-8 characters that could trigger the vulnerability.