Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 11 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 10 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually. | |
Title | SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-21T18:03:37.212Z
Reserved: 2025-01-29T15:18:03.210Z
Link: CVE-2025-24970

Updated: 2025-02-21T18:03:37.212Z

Status : Awaiting Analysis
Published: 2025-02-10T22:15:38.057
Modified: 2025-02-21T18:15:36.383
Link: CVE-2025-24970
