First published: Thu Jul 18 2024(Updated: )
Apache CXF is vulnerable to a denial of service, caused by a memory consumption flaw in CXF HTTP clients when preventing HTTPClient instances from being garbage collected. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.cxf:cxf-rt-transports-http | >=3.6.0<3.6.4 | 3.6.4 |
maven/org.apache.cxf:cxf-rt-transports-http | >=4.0.0<4.0.5 | 4.0.5 |
Apache CXF | >=3.6.0<3.6.4 | |
Apache CXF | >=4.0.0<4.0.5 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41172 has been classified as a medium severity denial of service vulnerability.
To fix CVE-2024-41172, upgrade your Apache CXF installation to version 3.6.4 or higher, or to version 4.0.5 or higher.
CVE-2024-41172 affects Apache CXF versions between 3.6.0 and 3.6.4, and between 4.0.0 and 4.0.5.
Yes, CVE-2024-41172 can be exploited remotely by sending specially crafted HTTP requests.
CVE-2024-41172 can lead to denial of service by preventing HTTPClient instances from being garbage collected, consuming significant memory.