CVE-2024-8184
ADVISORY - githubSummary
Impact
Remote DOS attack can cause out of memory
Description
There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which
can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By
repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the
server's memory.
Affected Versions
- Jetty 12.0.0-12.0.8 (Supported)
- Jetty 11.0.0-11.0.23 (EOL)
- Jetty 10.0.0-10.0.23 (EOL)
- Jetty 9.3.12-9.4.55 (EOL)
Patched Versions
- Jetty 12.0.9
- Jetty 11.0.24
- Jetty 10.0.24
- Jetty 9.4.56
Workarounds
Do not use ThreadLimitHandler.
Consider use of QoSHandler instead to artificially limit resource utilization.
References
Jetty 12 - https://github.com/jetty/jetty.project/pull/11723
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
NIST
CVSS SCORE
5.9mediumGitHub
CVSS SCORE
5.9mediumDebian
-
Ubuntu
2.8
CVSS SCORE
6.5mediumRed Hat
2.8
CVSS SCORE
6.5mediumChainguard
CGA-3v96-9425-c5jg
-
Chainguard
CGA-45xv-w77x-56w8
-
Chainguard
CGA-4x6r-cwfp-wvmh
-
Chainguard
CGA-56m4-5757-c9j7
-
Chainguard
CGA-6wch-9rxv-fw5r
-
Chainguard
CGA-8689-qv7w-w4w8
-
Chainguard
CGA-8cjr-ccm5-q989
-
Chainguard
CGA-8vvp-pq4p-2hc6
-
Chainguard
CGA-94hw-fpwc-gf4p
-
Chainguard
CGA-c7jc-pc4g-5wpx
-
Chainguard
CGA-c8xx-wqr2-vpgm
-
Chainguard
CGA-f4m3-6jhg-xc6m
-
Chainguard
CGA-g4cq-fr4v-r542
-
Chainguard
CGA-h6g3-pgx4-5qf9
-
Chainguard
CGA-hmc6-7f6h-r2jp
-
Chainguard
CGA-m9gp-rqph-jfcv
-
Chainguard
CGA-p858-c98g-7rp9
-
Chainguard
CGA-rgmc-7h79-v9m6
-
Chainguard
CGA-vp9g-g9wg-4xpq
-
Chainguard
CGA-xj92-8mfm-x22p
-
minimos
MINI-2382-3q76-8c86
-
minimos
MINI-9g7c-p633-jfpj
-
minimos
MINI-hhjc-mhwc-67g4
-