A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3690 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 | Issue Tracking Vendor Advisory |
https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 | Patch Third Party Advisory |
https://issues.redhat.com/browse/UNDERTOW-1935 | Exploit Issue Tracking Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
07 Jul 2023, 19:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 |
27 Aug 2022, 02:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:* cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
CWE | CWE-400 | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2021-3690 - Vendor Advisory | |
References | (MISC) https://issues.redhat.com/browse/UNDERTOW-1935 - Exploit, Issue Tracking, Mitigation, Vendor Advisory | |
References | (MISC) https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 - Patch, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1991299 - Issue Tracking, Vendor Advisory |
23 Aug 2022, 17:04
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-23 16:15
Updated : 2024-02-04 22:51
NVD link : CVE-2021-3690
Mitre link : CVE-2021-3690
CVE.ORG link : CVE-2021-3690
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- integration_camel_quarkus
- fuse
- openshift_application_runtimes
- enterprise_linux
- undertow
- single_sign-on
- integration_camel_k