Red Hat Jboss Remoting
By the Year
In 2022 there have been 0 vulnerabilities in Red Hat Jboss Remoting . Last year Jboss Remoting had 2 security vulnerabilities published. Right now, Jboss Remoting is on track to have less security vulnerabilities in 2022 than it did last year.
It may take a day or so for new Jboss Remoting vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Jboss Remoting Security Vulnerabilities
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001
5.9 - Medium
- June 02, 2021
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4
7.5 - High
- March 23, 2021
A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable.
Improper Resource Shutdown or Release