First published: Thu Jul 18 2024(Updated: )
The REST compare API has buffer leak issue in RHDG, and I have confirmed that "OutOfMemoryError: Direct buffer memory" can occur when sending a request with some extent size of POST data (like 1MiB) to the REST API continually. As the REST endpoint is secured (= authentication is required) by default in RHDG, it's not possible for anonymous attackers to utilize this issue. However, a malicious user can utilize this issue for DoS attack. Hence.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Data Grid |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2298555 is considered high due to its potential to cause OutOfMemoryError in applications using the REST compare API.
To fix REDHAT-BUG-2298555, you will need to apply the relevant patch or update provided by Red Hat for the Data Grid software.
The main effect of REDHAT-BUG-2298555 is increased memory consumption leading to potential application crashes due to OutOfMemoryError.
REDHAT-BUG-2298555 affects Red Hat Data Grid products that utilize the REST compare API.
Yes, REST endpoints affected by REDHAT-BUG-2298555 are secured by default, requiring authentication to access.