First published: Fri Aug 21 2015(Updated: )
no sanity checks and unbounded header sizes/counts leads to OOME from EAP 6 http management console
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=6.4.3 | |
Red Hat JBoss WildFly Application Server | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-5220 is classified as a denial of service vulnerability with potential high impact due to memory consumption.
To fix CVE-2015-5220, upgrade to Red Hat JBoss Enterprise Application Platform version 6.4.4 or later, or update to the latest version of WildFly.
CVE-2015-5220 affects Red Hat JBoss Enterprise Application Platform versions prior to 6.4.4 and WildFly versions up to 2.0.0.
CVE-2015-5220 enables remote attackers to exploit memory consumption vulnerabilities leading to denial of service.
CVE-2015-5220 was reported as a vulnerability in April 2015.