Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat quarkus |
|
CPEs | cpe:/a:redhat:quarkus:3.15::el8 | |
Vendors & Products |
Redhat
Redhat quarkus |
Wed, 13 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netty
Netty netty |
|
CPEs | cpe:2.3:a:netty:netty:-:*:*:*:*:*:*:* | |
Vendors & Products |
Netty
Netty netty |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Nov 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115. | |
Title | Denial of Service attack on windows app using Netty | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-13T20:44:41.743Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47535

Updated: 2024-11-13T20:44:36.110Z

Status : Awaiting Analysis
Published: 2024-11-12T16:15:22.237
Modified: 2024-11-13T17:01:58.603
Link: CVE-2024-47535
