5.9
CVSSv3

CVE-2021-3597

Published: 24/05/2022 Updated: 10/11/2022
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions before 2.0.35.SP1, before 2.2.6.SP1, before 2.2.7.SP1, before 2.0.36.SP1, before 2.2.9.Final and before 2.0.39.Final.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat single sign-on -

redhat jboss enterprise application platform -

redhat openshift application runtimes -

redhat fuse 1.0

redhat undertow 2.0.39

redhat undertow 2.2.9

redhat undertow 2.0.36

redhat undertow 2.2.7

redhat undertow 2.2.6

redhat undertow

redhat undertow 2.0.35

redhat jboss_enterprise_application_platform 7.3

redhat jboss_enterprise_application_platform 7.4

netapp oncommand workflow automation -

netapp oncommand insight -

netapp active iq unified manager -

Vendor Advisories

Synopsis Important: Red Hat support for Spring Boot 2510 update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat OpenShift Application RuntimesRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which gives a ...
Debian Bug report logs - #989861 undertow: CVE-2021-3597 Package: src:undertow; Maintainer for src:undertow is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 14 Jun 2021 20:15:02 UTC Severity: important Tags: security, upstream ...
No description is available for this CVE ...