CVE-2023-1973
Description
A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory.
CWE
- CWE-20 — Improper Input Validation
Affected
- Red Hat / Red Hat JBoss Enterprise Application Platform 7 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 — v=0:2.2.30-1.SP1_redhat_00001.1.el8eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 — v=0:2.2.30-1.SP1_redhat_00001.1.el9eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 — v=0:2.2.30-1.SP1_redhat_00001.1.el7eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 8 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 — v=0:2.3.11-1.SP1_redhat_00001.1.el8eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 — v=0:2.3.11-1.SP1_redhat_00001.1.el9eap <* [unaffected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
- https://access.redhat.com/errata/RHSA-2024:1674 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:1675 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:1676 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:1677 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:2763 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:2764 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-1973 vdb-entry, x_refsource_REDHAT
- https://bugzilla.redhat.com/show_bug.cgi?id=2185662 issue-tracking, x_refsource_REDHAT
Source
cvelistV5-main/cves/2023/1xxx/CVE-2023-1973.json