7.5
CVSSv3

CVE-2019-17555

Published: 04/12/2019 Updated: 13/12/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache olingo

Mailing Lists

CVE-2019-17555: DoS via Retry-After header vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Olingo 400 to 460 The OData v2 versions of Olingo 2x are not affected Description: The AsyncResponseWrapperImpl class reads the Retry-After header and passes it to the Threadsleep() method without any check ...