First published: Fri Sep 19 2014(Updated: )
It was discovered that by requesting a large enough image size for a generated QR code, a remote attacker could cause uncontrolled resource consumption leading to denial of service for legitimate users. Upstream Issue: <a href="https://issues.jboss.org/browse/KEYCLOAK-699">https://issues.jboss.org/browse/KEYCLOAK-699</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak | <1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3651 is classified as a denial-of-service vulnerability that can lead to significant service disruption.
To mitigate CVE-2014-3651, upgrade Keycloak to version 1.0.4 or later, which addresses the vulnerability.
CVE-2014-3651 is caused by uncontrolled resource consumption when generating QR codes of large sizes.
Yes, CVE-2014-3651 can be exploited remotely by an attacker through crafted requests.
CVE-2014-3651 affects Keycloak versions prior to 1.0.4.