First published: Mon Feb 15 2016(Updated: )
It was reported that HTTPS NIO connector uses no timeout when reading SSL handshake from a client to tie up a thread on the server just by creating a socket. Attacker could create socket and then never sends the handshake or any data at all, which causes the thread to remain occupied indefinitely so long as the socket remains open. Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1307039">https://bugzilla.redhat.com/show_bug.cgi?id=1307039</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | =6.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2094 has been classified as a medium severity vulnerability.
To fix CVE-2016-2094, update to the latest version of Red Hat JBoss Enterprise Application Platform that includes the necessary security patches.
CVE-2016-2094 can lead to a denial of service on JBoss by exhausting server threads through an attacker creating sockets without completing the SSL handshake.
CVE-2016-2094 specifically affects Red Hat JBoss Enterprise Application Platform version 6.4.6.
There are no known workarounds for CVE-2016-2094, so applying the patch is the recommended solution.