A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/44099/ | exploit vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2018:0269 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0270 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0271 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0268 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0275 | vendor advisory |
http://www.securitytracker.com/id/1040323 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1530457 | issue tracking vendor advisory |