First published: Mon Apr 30 2018(Updated: )
Undertow has a file handler leak vulnerability caused by JarURLConnection.getLastModified(). A remote attacker could exploit this to cause a denial of service. External References: <a href="https://issues.jboss.org/browse/UNDERTOW-1338">https://issues.jboss.org/browse/UNDERTOW-1338</a> <a href="https://bugs.openjdk.java.net/browse/JDK-6956385">https://bugs.openjdk.java.net/browse/JDK-6956385</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Undertow |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1573045 is rated as a denial of service vulnerability.
To fix REDHAT-BUG-1573045, update to the latest patched version of JBoss Undertow.
Organizations using JBoss Undertow for web services can be affected by REDHAT-BUG-1573045.
REDHAT-BUG-1573045 can lead to a denial of service attack, affecting application availability.
Currently, the recommended approach is to apply software updates as no specific workaround is mentioned.