CVE Vulnerabilities

CVE-2023-5685

Uncontrolled Resource Consumption

Published: Mar 22, 2024 | Modified: Nov 26, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
EAP 7.4.14 RedHat *
Red Hat build of Apache Camel 4.4.0 for Spring Boot RedHat xnio *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 RedHat eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap *
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 RedHat eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el8eap *
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 RedHat eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el9eap *
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 RedHat eap7-jboss-xnio-base-0:3.8.11-1.SP1_redhat_00001.1.el7eap *
Jboss-xnio Ubuntu focal *
Jboss-xnio Ubuntu mantic *
Jboss-xnio Ubuntu oracular *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References