First published: Tue Jun 07 2016(Updated: )
handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.netty:netty-handler | >=4.1.0.Beta1<4.1.1.Final | 4.1.1.Final |
maven/io.netty:netty-handler | >=4.0.0.Alpha1<4.0.37.Final | 4.0.37.Final |
redhat/netty | <4.0.37 | 4.0.37 |
redhat/netty | <4.1.1 | 4.1.1 |
NettyRPC | >=4.0.20<4.0.37 | |
NettyRPC | >=4.1.0<4.1.1 | |
Red Hat JBoss Data Grid | =7.1 | |
Red Hat JBoss Middleware | =1.0 | |
Apache Cassandra | =3.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-4970 is classified as a denial of service vulnerability, which can lead to an infinite loop in affected Netty versions.
To fix CVE-2016-4970, upgrade to Netty version 4.0.37.Final or 4.1.1.Final and ensure no older versions are in use.
CVE-2016-4970 affects Netty versions prior to 4.0.37.Final and 4.1.1.Final.
Yes, CVE-2016-4970 allows remote attackers to exploit the vulnerability and cause a denial of service.
CVE-2016-4970 is found in the io.netty:netty-handler package among others.