Description
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2017-1409.html
http://www.securityfocus.com/bid/98965
https://access.redhat.com/errata/RHSA-2017:1410
https://access.redhat.com/errata/RHSA-2017:1411
https://access.redhat.com/errata/RHSA-2017:1412
https://access.redhat.com/errata/RHSA-2017:3454
https://access.redhat.com/errata/RHSA-2017:3455
https://access.redhat.com/errata/RHSA-2017:3456
https://access.redhat.com/errata/RHSA-2017:3458
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2670
https://www.debian.org/security/2017/dsa-3906
Related Vulnerabilities
CVE-2022-39259 Vulnerability in maven package io.github.skylot:jadx-plugins-api
CVE-2021-29943 Vulnerability in maven package org.apache.solr:solr-core
CVE-2023-33938 Vulnerability in maven package com.liferay.portal:release.portal.bom
CVE-2021-23648 Vulnerability in npm package @braintree/sanitize-url
CVE-2023-46589 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core