CVE-2023-3223

A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
References
Link Resource
https://access.redhat.com/errata/RHSA-2023:4505 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4506 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4507 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4509 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4918 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4919 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4920 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4921 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4924 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7247
https://access.redhat.com/security/cve/CVE-2023-3223 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2209689 Issue Tracking Vendor Advisory
https://security.netapp.com/advisory/ntap-20231027-0004/
https://access.redhat.com/errata/RHSA-2023:4505 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4506 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4507 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4509 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4918 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4919 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4920 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4921 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:4924 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7247
https://access.redhat.com/security/cve/CVE-2023-3223 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2209689 Issue Tracking Vendor Advisory
https://security.netapp.com/advisory/ntap-20231027-0004/
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform_text-only_advisories:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:16

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:4505 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4505 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4506 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4506 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4507 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4507 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4509 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4509 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4918 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4918 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4919 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4919 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4920 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4920 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4921 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4921 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:4924 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:4924 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7247 - () https://access.redhat.com/errata/RHSA-2023:7247 -
References () https://access.redhat.com/security/cve/CVE-2023-3223 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-3223 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2209689 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2209689 - Issue Tracking, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20231027-0004/ - () https://security.netapp.com/advisory/ntap-20231027-0004/ -

03 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:18

Updated : 2024-11-21 08:16


NVD link : CVE-2023-3223

Mitre link : CVE-2023-3223

CVE.ORG link : CVE-2023-3223


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • single_sign-on
  • jboss_enterprise_application_platform_text-only_advisories
  • openshift_container_platform
  • openshift_container_platform_for_ibm_linuxone
  • openshift_container_platform_for_power
  • undertow
  • jboss_enterprise_application_platform
CWE
CWE-789

Memory Allocation with Excessive Size Value

NVD-CWE-noinfo