CVE-2017-2670:
Moderate severity vulnerability that affects io.undertow:undertow-core
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.91592%
CWE
Published
10/19/2018
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.undertow:undertow-core | maven | < 1.3.28 | 1.3.28 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in WebSocket frame processing loops that lack termination checks after non-clean TCP closures. AbstractReceiveListener.handleEvent
is the primary entry point for frame processing on IO threads, making it the most likely candidate for the infinite loop. WebSocketChannel.receive()
is also implicated as it directly interacts with the channel's read operations. Both functions would appear in stack traces during exploitation due to their role in the IO thread processing loop. The confidence levels reflect the direct involvement of these functions in the vulnerable workflow described in the CVE.