A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2021-3859 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2010378 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 - Patch, Third Party Advisory | |
References | () https://github.com/undertow-io/undertow/pull/1296 - Third Party Advisory | |
References | () https://issues.redhat.com/browse/UNDERTOW-1979 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221201-0004/ - Third Party Advisory |
Information
Published : 2022-08-26 16:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3859
Mitre link : CVE-2021-3859
CVE.ORG link : CVE-2021-3859
JSON object : View
Products Affected
redhat
- undertow
- jboss_enterprise_application_platform
- single_sign-on
netapp
- cloud_secure_agent
- oncommand_workflow_automation
- oncommand_insight