A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the servers config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat build of Quarkus 3.8.6.redhat | RedHat | io.quarkus.http/quarkus-http-core:5.2.4.redhat-00001 | * |
Red Hat JBoss Enterprise Application Platform 7 | RedHat | undertow | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 | RedHat | eap7-undertow-0:2.2.33-1.SP1_redhat_00001.1.el8eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 | RedHat | eap7-undertow-0:2.2.33-1.SP1_redhat_00001.1.el9eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 | RedHat | eap7-undertow-0:2.2.33-1.SP1_redhat_00001.1.el7eap | * |
Red Hat JBoss Enterprise Application Platform 8 | RedHat | undertow | * |