Bug 1438885 (CVE-2017-2670) - CVE-2017-2670 undertow: IO thread DoS via unclean Websocket closing
Summary: CVE-2017-2670 undertow: IO thread DoS via unclean Websocket closing
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-2670
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 1438764 (view as bug list)
Depends On:
Blocks: 1438765 1520314
TreeView+ depends on / blocked
 
Reported: 2017-04-04 16:12 UTC by Bharti Kundal
Modified: 2021-02-17 02:23 UTC (History)
29 users (show)

Fixed In Version: undertow-core 1.3.28.Final-redhat-4
Doc Type: If docs needed, set a value
Doc Text:
It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
Clone Of:
Environment:
Last Closed: 2018-04-19 20:56:46 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1409 0 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform security update 2017-06-07 20:37:27 UTC
Red Hat Product Errata RHSA-2017:1410 0 normal SHIPPED_LIVE Moderate: JBoss Enterprise Application Platform 7.0.6 on Red Hat Enterprise Linux 6 2017-06-07 21:00:45 UTC
Red Hat Product Errata RHSA-2017:1411 0 normal SHIPPED_LIVE Moderate: JBoss Enterprise Application Platform 7.0.6 on Red Hat Enterprise Linux 7 2017-06-07 20:58:48 UTC
Red Hat Product Errata RHSA-2017:1412 0 normal SHIPPED_LIVE Moderate: eap7-jboss-ec2-eap security update 2017-06-07 21:22:17 UTC
Red Hat Product Errata RHSA-2017:3454 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 22:48:09 UTC
Red Hat Product Errata RHSA-2017:3455 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 22:57:25 UTC
Red Hat Product Errata RHSA-2017:3456 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 22:31:03 UTC
Red Hat Product Errata RHSA-2017:3458 0 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2017-12-13 23:26:13 UTC

Description Bharti Kundal 2017-04-04 16:12:56 UTC
It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.

Vulnerable code:

https://github.com/undertow-io/undertow/blob/1.4.12.Final/core/src/main/java/io/undertow/server/protocol/framed/AbstractFramedStreamSourceChannel.java#L288

Comment 2 Bharti Kundal 2017-04-04 18:51:30 UTC
*** Bug 1438764 has been marked as a duplicate of this bug. ***

Comment 3 Bharti Kundal 2017-04-06 18:52:50 UTC
Acknowledgments:

Name: Gregory Ramsperger, Ryan Moak

Comment 4 errata-xmlrpc 2017-06-07 16:38:56 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0.6

Via RHSA-2017:1409 https://rhn.redhat.com/errata/RHSA-2017-1409.html

Comment 5 errata-xmlrpc 2017-06-07 17:05:14 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2017:1411 https://access.redhat.com/errata/RHSA-2017:1411

Comment 6 errata-xmlrpc 2017-06-07 17:06:17 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:1410 https://access.redhat.com/errata/RHSA-2017:1410

Comment 7 errata-xmlrpc 2017-06-07 17:23:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:1412 https://access.redhat.com/errata/RHSA-2017:1412

Comment 10 Markus Koschany 2017-06-10 21:41:45 UTC
Can you share more information about the issue and your proposed patch for it? There were no changes made to

https://github.com/undertow-io/undertow/blob/1.4.12.Final/core/src/main/java/io/undertow/server/protocol/framed/AbstractFramedStreamSourceChannel.java#L288

in the past months hence I wonder how other users and distributions of undertow are supposed to address this bug.

The same goes for CVE-2017-2666. I would appreciate it if you could share more details about the vulnerability and the fix.

Comment 13 errata-xmlrpc 2017-12-13 17:35:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456

Comment 14 errata-xmlrpc 2017-12-13 18:27:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454

Comment 15 errata-xmlrpc 2017-12-13 18:43:19 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455

Comment 16 errata-xmlrpc 2017-12-13 18:50:22 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458


Note You need to log in before you can comment on or make changes to this bug.