First published: Thu Feb 20 2014(Updated: )
It was found that certain malformed requests caused RichFaces to leak memory. A remote, unauthenticated attacker could use this flaw to send a large number of malformed requests to a RichFaces application that uses the Atmosphere framework, leading to a denial of service (excessive memory consumption) on the application server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Web Framework Kit | =2.5.0 | |
redhat RichFaces | =4.3.4 | |
redhat RichFaces | =4.3.5 | |
redhat RichFaces | =5.0.0-alpha1 | |
redhat RichFaces | =5.0.0-alpha2 | |
redhat RichFaces | =5.0.0-alpha3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0086 has been classified as a moderate severity vulnerability due to its potential for denial of service.
To fix CVE-2014-0086, you should update your RichFaces version to a patched release that addresses the memory leak issue.
CVE-2014-0086 impacts Red Hat JBoss Web Framework Kit 2.5.0 and RichFaces versions 4.3.4, 4.3.5, and 5.0.0-alpha1, alpha2, and alpha3.
Yes, CVE-2014-0086 can be exploited by unauthenticated remote attackers through sending malformed requests.
Exploitation of CVE-2014-0086 can lead to excessive memory consumption, resulting in denial of service for the affected application.