First published: Wed Dec 14 2016(Updated: )
Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Wildfly Application Server | <=10.1.0 | |
Redhat Jboss Wildfly Application Server | =11.0.0-alpha1 | |
maven/org.wildfly:wildfly-undertow | <11.0.0.Beta1 | 11.0.0.Beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.