First published: Wed Dec 14 2016(Updated: )
Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.wildfly:wildfly-undertow | <11.0.0.Beta1 | 11.0.0.Beta1 |
Red Hat JBoss WildFly Application Server | <=10.1.0 | |
Red Hat JBoss WildFly Application Server | =11.0.0-alpha1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9589 has a severity rating that makes it critical due to its potential to cause denial of service.
To fix CVE-2016-9589, upgrade Undertow to version 11.0.0.Beta1 or later.
CVE-2016-9589 is a resource exhaustion vulnerability that can lead to a denial of service.
CVE-2016-9589 affects JBoss WildFly versions before 11.0.0.Beta1, including 10.1.0 and earlier.
CVE-2016-9589 impacts the Undertow component of JBoss WildFly, specifically its HTTP header cache.