First published: Mon Feb 15 2016(Updated: )
It was reported that HTTPS NIO connector uses no timeout when reading SSL handshake from a client to tie up a thread on the server just by creating a socket. Attacker could create socket and then never sends the handshake or any data at all, which causes the thread to remain occupied indefinitely so long as the socket remains open. Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1307039">https://bugzilla.redhat.com/show_bug.cgi?id=1307039</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =6.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.