First published: Thu May 02 2024(Updated: )
A vulnerability was found in Wildlfly management interface where there is no sockets limits to perform connections to http management interface. This may lead occasionally to a Denial of Service (DoS) for Wildfly server after nofile limit reaches its maximum. This requires normally local access as the management interface is not exposed by default and it is not a common configuration to make it public.
Affected Software | Affected Version | How to fix |
---|---|---|
WildFly |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2278615 is classified as a potential Denial of Service (DoS) issue due to unlimited socket connections.
To fix REDHAT-BUG-2278615, implement appropriate socket connection limits on the Wildfly management interface.
Not addressing REDHAT-BUG-2278615 may lead to a Denial of Service (DoS) condition when the nofile limit is reached.
REDHAT-BUG-2278615 affects users of Red Hat Wildfly who utilize the management interface without socket limits.
Yes, temporarily restricting the number of concurrent socket connections can serve as a workaround for REDHAT-BUG-2278615.