First published: Mon Feb 10 2025(Updated: )
Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as <a href="https://access.redhat.com/security/cve/CVE-2024-47535">CVE-2024-47535</a>. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.
Affected Software | Affected Version | How to fix |
---|---|---|
NettyRPC | <=4.1.118.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2344788 is classified as a critical vulnerability.
To fix REDHAT-BUG-2344788, update Netty to a version higher than 4.1.118.Final.
Versions of Netty up to and including 4.1.118.Final are affected by REDHAT-BUG-2344788.
REDHAT-BUG-2344788 can facilitate a denial of service attack on applications using the vulnerable Netty framework.
Yes, REDHAT-BUG-2344788 specifically affects Netty when loaded on Windows applications.