CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
59.2%
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
access.redhat.com/errata/RHSA-2023:1184
access.redhat.com/errata/RHSA-2023:1185
access.redhat.com/errata/RHSA-2023:1512
access.redhat.com/errata/RHSA-2023:1513
access.redhat.com/errata/RHSA-2023:1514
access.redhat.com/errata/RHSA-2023:1516
access.redhat.com/errata/RHSA-2023:2135
access.redhat.com/errata/RHSA-2023:3883
access.redhat.com/errata/RHSA-2023:3884
access.redhat.com/errata/RHSA-2023:3885
access.redhat.com/errata/RHSA-2023:3888
access.redhat.com/errata/RHSA-2023:3892
access.redhat.com/errata/RHSA-2023:3954
access.redhat.com/errata/RHSA-2023:4612
access.redhat.com/security/cve/CVE-2023-1108
bugzilla.redhat.com/show_bug.cgi?id=2174246
github.com/advisories/GHSA-m4mm-pg93-fv78
github.com/undertow-io/undertow
github.com/undertow-io/undertow/commit/1302c8cf4476936802504efe0d36c58dcd954f78
github.com/undertow-io/undertow/commit/1b763064a41a30583b5df9a118898513007a70be
github.com/undertow-io/undertow/commit/ccc053b55f5de9872bc1a4999fd6aa85fc5e146d
github.com/undertow-io/undertow/pull/1457
nvd.nist.gov/vuln/detail/CVE-2023-1108
security.netapp.com/advisory/ntap-20231020-0002