CVE-2014-0193

WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.
References
Link Resource
http://netty.io/news/2014/04/30/release-day.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2014-1019.html
http://rhn.redhat.com/errata/RHSA-2014-1020.html
http://rhn.redhat.com/errata/RHSA-2014-1021.html
http://rhn.redhat.com/errata/RHSA-2014-1351.html
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://secunia.com/advisories/58280 Vendor Advisory
http://secunia.com/advisories/59290
http://www.securityfocus.com/bid/67182
https://github.com/netty/netty/issues/2441
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
http://netty.io/news/2014/04/30/release-day.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2014-1019.html
http://rhn.redhat.com/errata/RHSA-2014-1020.html
http://rhn.redhat.com/errata/RHSA-2014-1021.html
http://rhn.redhat.com/errata/RHSA-2014-1351.html
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://secunia.com/advisories/58280 Vendor Advisory
http://secunia.com/advisories/59290
http://www.securityfocus.com/bid/67182
https://github.com/netty/netty/issues/2441
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:netty:netty:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:netty:netty:4.0.18:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://netty.io/news/2014/04/30/release-day.html - Patch, Vendor Advisory () http://netty.io/news/2014/04/30/release-day.html - Patch, Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-1019.html - () http://rhn.redhat.com/errata/RHSA-2014-1019.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1020.html - () http://rhn.redhat.com/errata/RHSA-2014-1020.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1021.html - () http://rhn.redhat.com/errata/RHSA-2014-1021.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1351.html - () http://rhn.redhat.com/errata/RHSA-2014-1351.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0675.html - () http://rhn.redhat.com/errata/RHSA-2015-0675.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0720.html - () http://rhn.redhat.com/errata/RHSA-2015-0720.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0765.html - () http://rhn.redhat.com/errata/RHSA-2015-0765.html -
References () http://secunia.com/advisories/58280 - Vendor Advisory () http://secunia.com/advisories/58280 - Vendor Advisory
References () http://secunia.com/advisories/59290 - () http://secunia.com/advisories/59290 -
References () http://www.securityfocus.com/bid/67182 - () http://www.securityfocus.com/bid/67182 -
References () https://github.com/netty/netty/issues/2441 - () https://github.com/netty/netty/issues/2441 -
References () https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E - () https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E -
References () https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html - () https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html -

Information

Published : 2014-05-06 14:55

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0193

Mitre link : CVE-2014-0193

CVE.ORG link : CVE-2014-0193


JSON object : View

Products Affected

netty

  • netty
CWE
CWE-399

Resource Management Errors