A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.
The product does not properly control the allocation and maintenance of a limited resource.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://issues.redhat.com/browse/UNDERTOW-1935 | issue tracking mitigation vendor advisory exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 | issue tracking vendor advisory |
https://access.redhat.com/security/cve/CVE-2021-3690 | vendor advisory |
https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 | third party advisory patch |