Vulnerability Name: | CVE-2018-1114 (CCN-150543) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-12-04 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-1114 Source: CCN Type: Red Hat Web site RHSA-2018:2643 - Security Advisory Source: REDHAT Type: Vendor Advisory RHSA-2018:2643 Source: CCN Type: Red Hat Web site RHSA-2018:2669 - Security Advisory Source: REDHAT Type: Vendor Advisory RHSA-2018:2669 Source: REDHAT Type: Vendor Advisory RHSA-2019:0877 Source: MISC Type: Third Party Advisory https://bugs.openjdk.java.net/browse/JDK-6956385 Source: CCN Type: Red Hat Bugzilla Bug 1573045 CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1114 Source: XF Type: UNKNOWN redhat-cve20181114-dos(150543) Source: MISC Type: Issue Tracking, Third Party Advisory https://issues.jboss.org/browse/UNDERTOW-1338 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |