First published: Mon Oct 14 2024(Updated: )
### Impact Remote DOS attack can cause out of memory ### Description There exists a security vulnerability in Jetty's `ThreadLimitHandler.getRemote()` which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. ### Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) ### Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56 ### Workarounds Do not use `ThreadLimitHandler`. Consider use of `QoSHandler` instead to artificially limit resource utilization. ### References Jetty 12 - https://github.com/jetty/jetty.project/pull/11723
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.eclipse.jetty:jetty-server | >=9.3.12<=9.4.55 | 9.4.56 |
maven/org.eclipse.jetty:jetty-server | >=11.0.0<=11.0.23 | 11.0.24 |
maven/org.eclipse.jetty:jetty-server | >=10.0.0<=10.0.23 | 10.0.24 |
maven/org.eclipse.jetty:jetty-server | >=12.0.0<=12.0.8 | 12.0.9 |
Mortbay Jetty | >=9.3.12<9.4.56 | |
Mortbay Jetty | >=10.0.0<10.0.24 | |
Mortbay Jetty | >=11.0.0<11.0.24 | |
Mortbay Jetty | >=12.0.0<12.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8184 is a critical vulnerability that enables a remote denial-of-service attack.
To fix CVE-2024-8184, upgrade to Jetty version 9.4.56, 10.0.24, 11.0.24, or 12.0.9.
CVE-2024-8184 affects Jetty versions from 9.3.12 through 9.4.55, 10.0.0 through 10.0.23, 11.0.0 through 11.0.23, and 12.0.0 through 12.0.8.
CVE-2024-8184 allows an attacker to conduct a remote denial-of-service (DoS) attack.
CVE-2024-8184 can be exploited by unauthorized users sending crafted requests.