First published: Thu Jul 31 2014(Updated: )
Netty is vulnerable to a denial of service, caused by an error in SslHandler. A remote attacker could exploit this vulnerability using a specially-crafted SSLv2Hello message to exhaust all available CPU resources and cause the application to enter into an infinite loop.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netty Netty | <=3.9.1.1 | |
Netty Netty | =3.6.0 | |
Netty Netty | =3.6.1 | |
Netty Netty | =3.6.2 | |
Netty Netty | =3.6.3 | |
Netty Netty | =3.6.4 | |
Netty Netty | =3.6.5 | |
Netty Netty | =3.6.6 | |
Netty Netty | =3.6.7 | |
Netty Netty | =3.6.8 | |
Netty Netty | =3.7.0 | |
Netty Netty | =3.8.0 | |
Netty Netty | =3.8.1 | |
Netty Netty | =3.9.0 | |
Netty Netty | =3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Netty vulnerability is CVE-2014-3488.
The severity rating of CVE-2014-3488 is medium.
This vulnerability in Netty can cause a denial of service by exhausting CPU resources.
A remote attacker can exploit this vulnerability using a specially-crafted SSLv2Hello message.
Yes, there are fixes available for CVE-2014-3488. Please refer to the provided reference for more information.