CVE-2024-47535
ADVISORY - githubSummary
Summary
An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.
Details
When the library netty is loaded in a java windows application, the library tries to identify the system environnement in which it is executed.
At this stage, Netty tries to load both /etc/os-release
and /usr/lib/os-release
even though it is in a Windows environment.
If netty finds this files, it reads them and loads them into memory.
By default :
- The JVM maximum memory size is set to 1 GB,
- A non-privileged user can create a directory at
C:\
and create files within it.
the source code identified : https://github.com/netty/netty/blob/4.1/common/src/main/java/io/netty/util/internal/PlatformDependent.java
Despite the implementation of the function normalizeOs()
the source code not verify the OS before reading C:\etc\os-release
and C:\usr\lib\os-release
.
PoC
Create a file larger than 1 GB of data in C:\etc\os-release
or C:\usr\lib\os-release
on a Windows environnement and start your Netty application.
To observe what the application does with the file, the security analyst used "Process Monitor" from the "Windows SysInternals" suite. (https://learn.microsoft.com/en-us/sysinternals/)
cd C:\etc
fsutil file createnew os-release 3000000000
The source code used is the Netty website code example : Echo ‐ the very basic client and server.
The vulnerability was tested on the 4.1.112.Final version.
The security analyst tried the same technique for C:\proc\sys\net\core\somaxconn
with a lot of values to impact Netty but the only things that works is the "larger than 1 GB file" technique. https://github.com/netty/netty/blob/c0fdb8e9f8f256990e902fcfffbbe10754d0f3dd/common/src/main/java/io/netty/util/NetUtil.java#L186
Impact
By loading the "file larger than 1 GB" into the memory, the Netty library exceeds the JVM memory limit and causes a crash in the java Windows application.
This behaviour occurs 100% of the time in both Server mode and Client mode if the large file exists.
Client mode :
Server mode :
somaxconn :
Severity
- Attack vector : "Local" because the attacker needs to be on the system where the Netty application is running.
- Attack complexity : "Low" because the attacker only need to create a massive file (regardless of its contents).
- Privileges required : "Low" because the attacker requires a user account to exploit the vulnerability.
- User intercation : "None" because the administrator don't need to accidentally click anywhere to trigger the vulnerability. Furthermore, the exploitation works with defaults windows/AD settings.
- Scope : "Unchanged" because only Netty is affected by the vulnerability.
- Confidentiality : "None" because no data is exposed through exploiting the vulnerability.
- Integrity : "None" because the explotation of the vulnerability does not allow editing, deleting or adding data elsewhere.
- Availability : "High" because the exploitation of this vulnerability crashes the entire java application.
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
Uncontrolled Resource Consumption
Uncontrolled Resource Consumption
NIST
1.8
CVSS SCORE
5.5mediumGitHub
1.8
CVSS SCORE
5.4mediumDebian
-
CVSS SCORE
N/AlowUbuntu
-
CVSS SCORE
N/AmediumRed Hat
1.8
CVSS SCORE
5.5mediumChainguard
CGA-249m-hw35-p92f
-
Chainguard
CGA-2hmx-pc95-g53j
-
Chainguard
CGA-32j5-9vxr-f8gg
-
Chainguard
CGA-4w7m-6h55-h45v
-
Chainguard
CGA-4x5h-chm2-3x3f
-
Chainguard
CGA-5945-9cm5-m63w
-
Chainguard
CGA-5hr5-g6v2-4w72
-
Chainguard
CGA-662r-hr8g-368h
-
Chainguard
CGA-6gx5-gm6g-66w5
-
Chainguard
CGA-6hrh-hv46-9997
-
Chainguard
CGA-6j48-cf22-44cr
-
Chainguard
CGA-79w8-rvc9-g2fj
-
Chainguard
CGA-7f9r-p4f4-v5f4
-
Chainguard
CGA-7r4j-75g8-v67g
-
Chainguard
CGA-7xvw-mh8g-pp9v
-
Chainguard
CGA-863f-cf6c-jj3q
-
Chainguard
CGA-86wr-wvw7-gxx6
-
Chainguard
CGA-896j-whgv-hvrh
-
Chainguard
CGA-8gfc-84vf-c8vw
-
Chainguard
CGA-954h-x5w4-9mp8
-
Chainguard
CGA-973v-pfgw-gfcx
-
Chainguard
CGA-9g9w-93jp-5j27
-
Chainguard
CGA-9m52-92pr-7rhq
-
Chainguard
CGA-c87q-52p2-7j4g
-
Chainguard
CGA-cm4q-39fx-m36q
-
Chainguard
CGA-crgc-hmgg-8m6p
-
Chainguard
CGA-fp8m-fwcf-c57x
-
Chainguard
CGA-fvph-5xcc-r8qf
-
Chainguard
CGA-g3qf-wprc-ppf2
-
Chainguard
CGA-gj9h-vv2f-p5rc
-
Chainguard
CGA-gpqh-qhwj-9g9g
-
Chainguard
CGA-gvxp-wjw6-3q9g
-
Chainguard
CGA-h8q5-9hfr-j973
-
Chainguard
CGA-j27g-jg7g-jjv2
-
Chainguard
CGA-j7vc-256v-rf57
-
Chainguard
CGA-j7w7-m586-rmf6
-
Chainguard
CGA-jvxx-j7p9-gw4r
-
Chainguard
CGA-jw36-9qc4-j785
-
Chainguard
CGA-m937-hhxp-2gm9
-
Chainguard
CGA-pfvc-73r9-g8ww
-
Chainguard
CGA-pj55-r8cf-957f
-
Chainguard
CGA-pp9h-9mpq-8mf6
-
Chainguard
CGA-q7qp-mqc2-cqff
-
Chainguard
CGA-qpr4-x3v9-rvj7
-
Chainguard
CGA-rgc4-vjv4-vx8m
-
Chainguard
CGA-rm86-ch9h-vw86
-
Chainguard
CGA-rpgv-63f6-9wq8
-
Chainguard
CGA-v7c6-6gm6-82vh
-
Chainguard
CGA-vv7m-rc5q-gr82
-
Chainguard
CGA-vw98-p996-659m
-
Chainguard
CGA-wr5g-9pqc-v4gw
-
Chainguard
CGA-wrh2-jqjj-3vv2
-
Chainguard
CGA-wvfp-pg8q-x2p2
-
Chainguard
CGA-x6pw-hh9f-9g3j
-
Chainguard
CGA-x8hm-v5q5-9pxj
-
Chainguard
CGA-xpg8-pwc5-69x9
-