Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1404782 - (CVE-2016-9589) CVE-2016-9589 wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
CVE-2016-9589 wildfly: ParseState headerValuesCache can be exploited to fill ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170322,repor...
: Security
Depends On:
Blocks: 1404783 1424497 1438536 1520314
  Show dependency treegraph
 
Reported: 2016-12-14 10:59 EST by Adam Mariš
Modified: 2018-10-19 17:39 EDT (History)
21 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that JBoss EAP 7 Header Cache was inefficient. An attacker could use this flaw to cause a denial of service attack.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0830 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform security update 2017-03-22 17:21:20 EDT
Red Hat Product Errata RHSA-2017:0831 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 7.0.5 on RHEL 6 2017-03-22 17:52:40 EDT
Red Hat Product Errata RHSA-2017:0832 normal SHIPPED_LIVE Important: JBoss Enterprise Application Platform 7.0.5 on RHEL 7 2017-03-22 17:51:39 EDT
Red Hat Product Errata RHSA-2017:0834 normal SHIPPED_LIVE Important: jboss-ec2-eap package for EAP 7.0.5 2017-03-22 18:01:35 EDT
Red Hat Product Errata RHSA-2017:0872 normal SHIPPED_LIVE Moderate: Red Hat Single Sign-On 7.1 update on RHEL 6 2017-04-04 17:26:43 EDT
Red Hat Product Errata RHSA-2017:0873 normal SHIPPED_LIVE Moderate: Red Hat Single Sign-On 7.1 update on RHEL 7 2017-04-04 17:26:10 EDT
Red Hat Product Errata RHSA-2017:0876 normal SHIPPED_LIVE Moderate: Red Hat Single Sign-On 7.1 update 2017-04-04 17:15:55 EDT
Red Hat Product Errata RHSA-2017:3454 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:48:09 EST
Red Hat Product Errata RHSA-2017:3455 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:57:25 EST
Red Hat Product Errata RHSA-2017:3456 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:31:03 EST
Red Hat Product Errata RHSA-2017:3458 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2017-12-13 18:26:13 EST

  None (edit)
Description Adam Mariš 2016-12-14 10:59:52 EST
Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.

Upstream bug:

https://issues.jboss.org/browse/WFLY-7725
Comment 5 Jason Shepherd 2016-12-18 18:42:20 EST
Acknowledgements:

Name: Gabriel Lavoie (Halogen Software)
Comment 6 errata-xmlrpc 2017-03-22 13:21:31 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0

Via RHSA-2017:0830 https://rhn.redhat.com/errata/RHSA-2017-0830.html
Comment 7 errata-xmlrpc 2017-03-22 13:54:13 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2017:0832 https://rhn.redhat.com/errata/RHSA-2017-0832.html
Comment 8 errata-xmlrpc 2017-03-22 13:54:35 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:0831 https://rhn.redhat.com/errata/RHSA-2017-0831.html
Comment 9 errata-xmlrpc 2017-03-22 14:02:03 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2017:0834 https://rhn.redhat.com/errata/RHSA-2017-0834.html
Comment 10 errata-xmlrpc 2017-04-04 13:16:16 EDT
This issue has been addressed in the following products:



Via RHSA-2017:0876 https://access.redhat.com/errata/RHSA-2017:0876
Comment 11 errata-xmlrpc 2017-04-04 13:27:27 EDT
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.1 for RHEL 7

Via RHSA-2017:0873 https://access.redhat.com/errata/RHSA-2017:0873
Comment 12 errata-xmlrpc 2017-04-04 13:27:50 EDT
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.1 for RHEL 6

Via RHSA-2017:0872 https://access.redhat.com/errata/RHSA-2017:0872
Comment 15 errata-xmlrpc 2017-12-13 12:34:23 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
Comment 16 errata-xmlrpc 2017-12-13 13:26:49 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
Comment 17 errata-xmlrpc 2017-12-13 13:42:46 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
Comment 18 errata-xmlrpc 2017-12-13 13:49:14 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458

Note You need to log in before you can comment on or make changes to this bug.