First published: Thu Jun 13 2024(Updated: )
A vulnerability was found in Undertow. Undertow chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in an uncontrolled resource consumption leaving the server side to a Denial of Service vulnerability attack. This happens only with Java 17 TLSv1.3 scenarios.
Affected Software | Affected Version | How to fix |
---|---|---|
Undertow |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2292211 is considered moderate due to the potential for resource exhaustion.
To fix REDHAT-BUG-2292211, you should update to the latest version of Undertow that addresses this vulnerability.
REDHAT-BUG-2292211 causes the Undertow server to hang after flushing chunked response body, leading to client timeout.
The potential impacts of REDHAT-BUG-2292211 include delayed response times and uncontrolled resource consumption on the server.
The specific versions of Undertow affected by REDHAT-BUG-2292211 are not detailed in the description, so all deployed versions should be reviewed.