Bug 1376646 (CVE-2016-7046)
| Summary: | CVE-2016-7046 undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Timothy Walsh <twalsh> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | asoldano, bbaranow, bmaxwell, brian.stansberry, cdewolf, csutherl, dandread, darran.lofthouse, dkreling, dosoudil, fjuma, istudens, ivassile, iweiss, jawilson, jshepherd, lgao, mosmerov, msochure, msvehla, myarboro, nwallace, pesilva, pjindal, pmackay, pslavice, rnetuka, rstancel, rsvoboda, smaestri, tom.jenkinson, twalsh, vtunka |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
It was discovered that a long URL sent to EAP 7 Server operating as a reverse proxy with default buffer sizes causes a Denial of Service.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-10-21 11:47:15 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1376426, 1380270, 1520314 | ||
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7 Via RHSA-2016:2641 https://rhn.redhat.com/errata/RHSA-2016-2641.html This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6 Via RHSA-2016:2640 https://rhn.redhat.com/errata/RHSA-2016-2640.html This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6 Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7 Via RHSA-2016:2642 https://rhn.redhat.com/errata/RHSA-2016-2642.html This issue has been addressed in the following products: Via RHSA-2016:2657 https://rhn.redhat.com/errata/RHSA-2016-2657.html This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Via RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458 |
A long URL when sent to EAP 7 Server operating as a reverse proxy with default buffer sizes causes a DoS. A long URL (about 1900 characters) is sent, the proxy server return error 500 (that's ok) starts to consume 100% CPU starts to fill logs log file with exceptions very fast (so disk space gets exhausted quickly) E.g. some infinite loop is initiated by the request. Proxy server must be restarted to stop the problem.