Search for vulnerabilities
Vulnerability details: VCID-kq61-ccrm-aaan
Vulnerability ID VCID-kq61-ccrm-aaan
Aliases CVE-2016-7046
GHSA-3f57-w2rp-72fc
Summary Uncontrolled Resource Consumption Remote attackers could cause a denial of service (CPU and disk consumption) via a long URL.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2016:2640
rhas Important https://access.redhat.com/errata/RHSA-2016:2641
rhas Important https://access.redhat.com/errata/RHSA-2016:2642
rhas Important https://access.redhat.com/errata/RHSA-2016:2657
rhas Important https://access.redhat.com/errata/RHSA-2017:3454
rhas Important https://access.redhat.com/errata/RHSA-2017:3455
rhas Important https://access.redhat.com/errata/RHSA-2017:3456
rhas Important https://access.redhat.com/errata/RHSA-2017:3458
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7046.json
epss 0.03475 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03475 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03475 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03475 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.03905 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.0548 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
epss 0.06972 https://api.first.org/data/v1/epss?cve=CVE-2016-7046
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1376646
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-3f57-w2rp-72fc
cvssv3.1 7.5 https://github.com/undertow-io/undertow
generic_textual HIGH https://github.com/undertow-io/undertow
cvssv3.1 5.9 https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2
generic_textual MODERATE https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2
cvssv3.1 5.9 https://issues.redhat.com/browse/UNDERTOW-835
generic_textual MODERATE https://issues.redhat.com/browse/UNDERTOW-835
cvssv2 7.1 https://nvd.nist.gov/vuln/detail/CVE-2016-7046
cvssv3 5.9 https://nvd.nist.gov/vuln/detail/CVE-2016-7046
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2016-2640.html
http://rhn.redhat.com/errata/RHSA-2016-2641.html
http://rhn.redhat.com/errata/RHSA-2016-2642.html
http://rhn.redhat.com/errata/RHSA-2016-2657.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7046.json
https://api.first.org/data/v1/epss?cve=CVE-2016-7046
https://github.com/undertow-io/undertow
https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2
https://issues.redhat.com/browse/UNDERTOW-835
http://www.securityfocus.com/bid/93173
1376646 https://bugzilla.redhat.com/show_bug.cgi?id=1376646
838600 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838600
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
CVE-2016-7046 https://access.redhat.com/security/cve/CVE-2016-7046
CVE-2016-7046 https://nvd.nist.gov/vuln/detail/CVE-2016-7046
CVE-2016-7046 https://security-tracker.debian.org/tracker/CVE-2016-7046
GHSA-3f57-w2rp-72fc https://github.com/advisories/GHSA-3f57-w2rp-72fc
RHSA-2016:2640 https://access.redhat.com/errata/RHSA-2016:2640
RHSA-2016:2641 https://access.redhat.com/errata/RHSA-2016:2641
RHSA-2016:2642 https://access.redhat.com/errata/RHSA-2016:2642
RHSA-2016:2657 https://access.redhat.com/errata/RHSA-2016:2657
RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7046.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/undertow-io/undertow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/undertow-io/undertow/commit/c518b5a1784061d807efedcef0a03fcd35a53de2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://issues.redhat.com/browse/UNDERTOW-835
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2016-7046
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-7046
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.91365
EPSS Score 0.03475
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.