← Back to CVEs
CVE-2014-0193
N/ADescription
WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.
CVE Details
CVSS v3.1 ScoreN/A
Published5/6/2014
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
netty:netty
Weaknesses (CWE)
CWE-399
References
http://netty.io/news/2014/04/30/release-day.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-1019.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-1020.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-1021.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2014-1351.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0675.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0720.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2015-0765.html(secalert@redhat.com)
http://secunia.com/advisories/58280(secalert@redhat.com)
http://secunia.com/advisories/59290(secalert@redhat.com)
http://www.securityfocus.com/bid/67182(secalert@redhat.com)
https://github.com/netty/netty/issues/2441(secalert@redhat.com)
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html(secalert@redhat.com)
http://netty.io/news/2014/04/30/release-day.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1019.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1020.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1021.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2014-1351.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0675.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0720.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0765.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58280(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59290(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67182(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/netty/netty/issues/2441(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.