vulnerability
Red Hat JBoss EAP: CVE-2021-37137: Uncontrolled Resource Consumption
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Sep 9, 2021 | Sep 19, 2024 | Jul 2, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Sep 9, 2021
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.. A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-400
- CVE-2021-37137
- https://attackerkb.com/topics/CVE-2021-37137
- URL-https://access.redhat.com/security/cve/CVE-2021-37137
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2004135
- URL-https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv
- URL-https://access.redhat.com/errata/RHSA-2022:4918
- URL-https://access.redhat.com/errata/RHSA-2022:4919
- URL-https://access.redhat.com/errata/RHSA-2022:4922
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.