First published: Wed Apr 30 2014(Updated: )
`WebSocket08FrameDecoder` in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a `TextWebSocketFrame` followed by a long stream of `ContinuationWebSocketFrames`.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netty Netty | =3.6.0 | |
Netty Netty | =3.6.1 | |
Netty Netty | =3.6.2 | |
Netty Netty | =3.6.3 | |
Netty Netty | =3.6.4 | |
Netty Netty | =3.6.5 | |
Netty Netty | =3.6.6 | |
Netty Netty | =3.6.7 | |
Netty Netty | =3.6.8 | |
Netty Netty | =3.7.0 | |
Netty Netty | =3.8.0 | |
Netty Netty | =3.8.1 | |
Netty Netty | =3.9.0 | |
Netty Netty | =4.0.0 | |
Netty Netty | =4.0.1 | |
Netty Netty | =4.0.2 | |
Netty Netty | =4.0.3 | |
Netty Netty | =4.0.4 | |
Netty Netty | =4.0.5 | |
Netty Netty | =4.0.6 | |
Netty Netty | =4.0.7 | |
Netty Netty | =4.0.8 | |
Netty Netty | =4.0.9 | |
Netty Netty | =4.0.10 | |
Netty Netty | =4.0.11 | |
Netty Netty | =4.0.12 | |
Netty Netty | =4.0.13 | |
Netty Netty | =4.0.14 | |
Netty Netty | =4.0.15 | |
Netty Netty | =4.0.16 | |
Netty Netty | =4.0.17 | |
Netty Netty | =4.0.18 | |
maven/io.netty:netty-all | >=4.0.0.Alpha1<4.0.19.Final | 4.0.19.Final |
maven/io.netty:netty | >=4.0.0.Alpha1<4.0.19.Final | 4.0.19.Final |
maven/io.netty:netty | >=3.9.0.Final<3.9.1.Final | 3.9.1.Final |
maven/io.netty:netty | >=3.8.0.Final<3.8.2.Final | 3.8.2.Final |
maven/io.netty:netty | >=3.7.0.Final<3.7.1.Final | 3.7.1.Final |
maven/io.netty:netty | >=3.6.0.Beta1<3.6.9.Final | 3.6.9.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0193 is a vulnerability in Netty that allows remote attackers to cause a denial of service by consuming excessive memory.
The vulnerability in Netty 3.6.x to 3.9.1 occurs when a TextWebSocketFrame is followed by a long stream of ContinuationWebSocketFrames, leading to memory consumption and a denial of service.
The severity of CVE-2014-0193 is medium.
To fix the vulnerability in Netty 4.0.x, update to version 4.0.19 or later.
To fix the vulnerability in Netty 3.6.x to 3.9.1, update to version 3.9.1 or later.