
We found results for “”
CVE-2020-11612
Good to know:


Date: April 7, 2020
The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.
Language: Java
Severity Score
Related Resources (83)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version fiji - 20250206;logstash-binary - 7.8.1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:9.0.0.Alpha1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:9.0.0.Alpha1;org.apache.activemq.examples.rest:dup-send:2.10.1;org.apache.activemq.examples.rest:dup-send:2.12.0;org.apache.activemq.examples.rest:dup-send:2.10.0;org.apache.activemq.examples.rest:dup-send:2.8.0;org.infinispan:infinispan-nearcache-client:9.0.0.Alpha1;org.infinispan:infinispan-nearcache-client:9.0.0.Alpha1;org.jboss.fuse.modules:fuse-pax-transx-tm-narayana:no_fix;io.netty:netty-all:4.0.38.Final;io.netty:netty-all:4.0.37.Final;io.netty:netty-all:4.0.19.Final;io.netty:netty-all:4.0.27.Final;io.netty:netty-all:4.1.46.Final;io.netty:netty-all:4.0.34.Final;io.netty:netty-all:4.0.33.Final;io.netty:netty-all:4.0.36.Final;org.teiid:vdb-base-builder:1.6.0;io.netty:netty-codec:4.0.33.Final;io.netty:netty-codec:4.0.38.Final;io.netty:netty-codec:no_fix;io.netty:netty-codec:4.0.21.Final;io.netty:netty-codec:4.1.46.Final;io.netty:netty-codec:4.0.42.Final;org.apache.activemq.examples.rest:push:2.8.0;org.apache.activemq.examples.rest:push:2.12.0;org.apache.activemq.examples.rest:push:2.10.1;org.apache.activemq.examples.rest:push:2.10.0;org.apache.activemq:artemis-jms-client-all:2.6.4;org.apache.activemq:artemis-jms-client-all:2.12.0;org.apache.activemq:artemis-jms-client-all:2.8.0;org.apache.activemq:artemis-jms-client-all:2.10.1;org.apache.activemq:artemis-jms-client-all:2.10.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.10.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.8.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.12.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.10.1;org.amqphub.jca:resource-adapter-thorntail-example:no_fix;org.apache.activemq.examples.rest:javascript-chat:2.8.0;org.apache.activemq.examples.rest:javascript-chat:2.10.0;org.apache.activemq.examples.rest:javascript-chat:2.12.0;org.apache.activemq.examples.rest:javascript-chat:2.10.1;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.8.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.1;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.12.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.0;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.wildfly:wildfly-client-all:10.0.0.Final;org.wildfly:wildfly-client-all:10.0.0.CR5;org.uberfire:showcase-distribution-wars:7.40.0.Final;io.syndesis.meta:meta:1.3.5
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | PARTIAL |
Additional information: |