Search for vulnerabilities
Vulnerability details: VCID-3e3k-91cx-aaab
Vulnerability ID VCID-3e3k-91cx-aaab
Aliases CVE-2016-9589
GHSA-p4xg-cpr9-vwvj
Summary Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://rhn.redhat.com/errata/RHSA-2017-0830.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2017-0830.html
cvssv3.1 7.5 http://rhn.redhat.com/errata/RHSA-2017-0831.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2017-0831.html
cvssv3.1 7.5 http://rhn.redhat.com/errata/RHSA-2017-0832.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2017-0832.html
cvssv3.1 7.5 http://rhn.redhat.com/errata/RHSA-2017-0834.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2017-0834.html
cvssv3.1 5.9 http://rhn.redhat.com/errata/RHSA-2017-0876.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2017-0876.html
rhas Moderate https://access.redhat.com/errata/RHSA-2017:0830
rhas Important https://access.redhat.com/errata/RHSA-2017:0831
rhas Important https://access.redhat.com/errata/RHSA-2017:0832
rhas Important https://access.redhat.com/errata/RHSA-2017:0834
rhas Moderate https://access.redhat.com/errata/RHSA-2017:0872
rhas Moderate https://access.redhat.com/errata/RHSA-2017:0873
rhas Moderate https://access.redhat.com/errata/RHSA-2017:0876
rhas Important https://access.redhat.com/errata/RHSA-2017:3454
rhas Important https://access.redhat.com/errata/RHSA-2017:3455
rhas Important https://access.redhat.com/errata/RHSA-2017:3456
rhas Important https://access.redhat.com/errata/RHSA-2017:3458
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9589.json
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01059 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01426 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01426 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01426 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.01469 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03086 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.03208 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
epss 0.04782 https://api.first.org/data/v1/epss?cve=CVE-2016-9589
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1404782
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-p4xg-cpr9-vwvj
cvssv3.1 4.3 https://github.com/wildfly/wildfly
generic_textual MODERATE https://github.com/wildfly/wildfly
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2016-9589
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-9589
cvssv3.1 7.5 https://web.archive.org/web/20200227180917/https://www.securityfocus.com/bid/97060
generic_textual HIGH https://web.archive.org/web/20200227180917/https://www.securityfocus.com/bid/97060
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2017-0830.html
http://rhn.redhat.com/errata/RHSA-2017-0831.html
http://rhn.redhat.com/errata/RHSA-2017-0832.html
http://rhn.redhat.com/errata/RHSA-2017-0834.html
http://rhn.redhat.com/errata/RHSA-2017-0876.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9589.json
https://api.first.org/data/v1/epss?cve=CVE-2016-9589
https://github.com/wildfly/wildfly
https://web.archive.org/web/20200227180917/https://www.securityfocus.com/bid/97060
https://web.archive.org/web/20200227180917/https://www.securityfocus.com/bid/97060/
http://www.securityfocus.com/bid/97060
1404782 https://bugzilla.redhat.com/show_bug.cgi?id=1404782
cpe:2.3:a:redhat:jboss_wildfly_application_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_wildfly_application_server:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:alpha1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:alpha1:*:*:*:*:*:*
CVE-2016-9589 https://nvd.nist.gov/vuln/detail/CVE-2016-9589
GHSA-p4xg-cpr9-vwvj https://github.com/advisories/GHSA-p4xg-cpr9-vwvj
RHSA-2017:0830 https://access.redhat.com/errata/RHSA-2017:0830
RHSA-2017:0831 https://access.redhat.com/errata/RHSA-2017:0831
RHSA-2017:0832 https://access.redhat.com/errata/RHSA-2017:0832
RHSA-2017:0834 https://access.redhat.com/errata/RHSA-2017:0834
RHSA-2017:0872 https://access.redhat.com/errata/RHSA-2017:0872
RHSA-2017:0873 https://access.redhat.com/errata/RHSA-2017:0873
RHSA-2017:0876 https://access.redhat.com/errata/RHSA-2017:0876
RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://rhn.redhat.com/errata/RHSA-2017-0830.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://rhn.redhat.com/errata/RHSA-2017-0831.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://rhn.redhat.com/errata/RHSA-2017-0832.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://rhn.redhat.com/errata/RHSA-2017-0834.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://rhn.redhat.com/errata/RHSA-2017-0876.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9589.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/wildfly/wildfly
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-9589
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-9589
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://web.archive.org/web/20200227180917/https://www.securityfocus.com/bid/97060
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.84525
EPSS Score 0.01059
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.