icon

We found results for “

CVE-2020-11612

Good to know:

icon
icon

Date: April 7, 2020

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.

Language: Java

Severity Score

Related Resources (83)

Severity Score

Weakness Type (CWE)

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-119

Uncontrolled Resource Consumption

CWE-400

Allocation of Resources Without Limits or Throttling

CWE-770

Top Fix

icon

Upgrade Version

Upgrade to version fiji - 20250206;logstash-binary - 7.8.1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:9.0.0.Alpha1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:7.0.0.Alpha1;org.infinispan:infinispan-server-rest:9.0.0.Alpha1;org.apache.activemq.examples.rest:dup-send:2.10.1;org.apache.activemq.examples.rest:dup-send:2.12.0;org.apache.activemq.examples.rest:dup-send:2.10.0;org.apache.activemq.examples.rest:dup-send:2.8.0;org.infinispan:infinispan-nearcache-client:9.0.0.Alpha1;org.infinispan:infinispan-nearcache-client:9.0.0.Alpha1;org.jboss.fuse.modules:fuse-pax-transx-tm-narayana:no_fix;io.netty:netty-all:4.0.38.Final;io.netty:netty-all:4.0.37.Final;io.netty:netty-all:4.0.19.Final;io.netty:netty-all:4.0.27.Final;io.netty:netty-all:4.1.46.Final;io.netty:netty-all:4.0.34.Final;io.netty:netty-all:4.0.33.Final;io.netty:netty-all:4.0.36.Final;org.teiid:vdb-base-builder:1.6.0;io.netty:netty-codec:4.0.33.Final;io.netty:netty-codec:4.0.38.Final;io.netty:netty-codec:no_fix;io.netty:netty-codec:4.0.21.Final;io.netty:netty-codec:4.1.46.Final;io.netty:netty-codec:4.0.42.Final;org.apache.activemq.examples.rest:push:2.8.0;org.apache.activemq.examples.rest:push:2.12.0;org.apache.activemq.examples.rest:push:2.10.1;org.apache.activemq.examples.rest:push:2.10.0;org.apache.activemq:artemis-jms-client-all:2.6.4;org.apache.activemq:artemis-jms-client-all:2.12.0;org.apache.activemq:artemis-jms-client-all:2.8.0;org.apache.activemq:artemis-jms-client-all:2.10.1;org.apache.activemq:artemis-jms-client-all:2.10.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.10.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.8.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.12.0;org.apache.activemq.examples.rest:mixed-jms-rest:2.10.1;org.amqphub.jca:resource-adapter-thorntail-example:no_fix;org.apache.activemq.examples.rest:javascript-chat:2.8.0;org.apache.activemq.examples.rest:javascript-chat:2.10.0;org.apache.activemq.examples.rest:javascript-chat:2.12.0;org.apache.activemq.examples.rest:javascript-chat:2.10.1;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.8.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.1;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.12.0;org.apache.activemq.examples.modules:artemis-tomcat-jndi-resources-sample:2.10.0;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.wildfly:wildfly-client-all:10.0.0.Final;org.wildfly:wildfly-client-all:10.0.0.CR5;org.uberfire:showcase-distribution-wars:7.40.0.Final;io.syndesis.meta:meta:1.3.5

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us