Description
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2017-1409.html
http://www.securityfocus.com/bid/98965
https://access.redhat.com/errata/RHSA-2017:1410
https://access.redhat.com/errata/RHSA-2017:1411
https://access.redhat.com/errata/RHSA-2017:1412
https://access.redhat.com/errata/RHSA-2017:3454
https://access.redhat.com/errata/RHSA-2017:3455
https://access.redhat.com/errata/RHSA-2017:3456
https://access.redhat.com/errata/RHSA-2017:3458
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2670
https://www.debian.org/security/2017/dsa-3906
Related Vulnerabilities
CVE-2021-37304 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-base
CVE-2022-23106 Vulnerability in maven package io.jenkins:configuration-as-code
CVE-2021-39185 Vulnerability in maven package org.http4s:http4s-server
CVE-2023-31579 Vulnerability in maven package top.tangyh.basic:lamp-util
CVE-2022-36099 Vulnerability in maven package org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki