Resource Exhaustion Vulnerability in Red Hat WildFly
CVE-2016-9589
Summary
The Undertow component of Red Hat WildFly prior to version 11.0.0.Beta1 is susceptible to a resource exhaustion vulnerability. This issue arises from the caching mechanism of HTTP headers in persistent connections. An attacker can exploit this vulnerability by continuously sending large amounts of header data, causing the server to fill its memory with excessive garbage data. Such exploitation can lead to a denial of service, impacting the overall stability of the server and performance for legitimate users. The default configuration allows for a potential memory overload due to the caching limits of 'max-headers' (default 200) multiplied by 'max-header-size' (default 1MB) for each active TCP connection.
Affected Version(s)
wildfly 11.0.0.Beta1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved