vulnerability
Red Hat JBossEAP: Uncontrolled Resource Consumption (CVE-2025-25193)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 2025-02-10 | 2025-03-13 | 2025-05-08 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
2025-02-10
Added
2025-03-13
Modified
2025-05-08
Description
Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.. A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2025-25193
- https://attackerkb.com/topics/CVE-2025-25193
- URL-https://access.redhat.com/security/cve/CVE-2025-25193
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2344788
- URL-https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386
- URL-https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx
- URL-https://access.redhat.com/errata/RHSA-2025:3357
- URL-https://access.redhat.com/errata/RHSA-2025:3358
- URL-https://access.redhat.com/errata/RHSA-2025:3465
- URL-https://access.redhat.com/errata/RHSA-2025:3467
- URL-https://access.redhat.com/errata/RHSA-2025:4548
- URL-https://access.redhat.com/errata/RHSA-2025:4549
- URL-https://access.redhat.com/errata/RHSA-2025:4550
- URL-https://access.redhat.com/errata/RHSA-2025:4552

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.