First published: Wed Jan 03 2018(Updated: )
A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jboss Jboss-remoting | =3.3.10 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 | |
Redhat Jboss Enterprise Application Platform | =6.4.0 | |
Redhat Linux | =5.0 | |
Redhat Linux | =6.0 | |
Redhat Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1041 is a vulnerability in the RemoteMessageChannel component introduced in jboss-remoting versions 3.3.10.
The severity of CVE-2018-1041 is high (7.5).
CVE-2018-1041 affects jboss-remoting version 3.3.10 and Redhat Jboss Enterprise Application Platform versions 6.0.0 and 6.4.0.
An attacker can exploit CVE-2018-1041 to cause denial of service by triggering an infinite loop, resulting in high CPU usage.
CVE-2018-1041 can be mitigated by updating to a patched version of jboss-remoting or applying the necessary security updates for Redhat Jboss Enterprise Application Platform.