First published: Thu Jun 08 2023(Updated: )
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Red Hat JBoss Enterprise Application Platform | =7.4 | |
Any of | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3171 is considered a high severity vulnerability due to the potential for heap exhaustion caused by deserialization flaws.
To fix CVE-2023-3171, you should upgrade to the latest patched version of Red Hat JBoss Enterprise Application Platform or apply the recommended security updates.
CVE-2023-3171 can lead to denial of service by exhausting heap memory if exploited through malicious requests.
CVE-2023-3171 specifically affects Red Hat JBoss Enterprise Application Platform version 7.4.
While a patch is the most effective solution for CVE-2023-3171, mitigating the risk may involve limiting access to the application to trusted sources.