Bug 572218 (CVE-2021-28165) - Jetty 100% CPU upon receiving a large invalid TLS Frame
Summary: Jetty 100% CPU upon receiving a large invalid TLS Frame
Status: RESOLVED FIXED
Alias: CVE-2021-28165
Product: Community
Classification: Eclipse Foundation
Component: Vulnerability Reports (show other bugs)
Version: unspecified   Edit
Hardware: PC All
: P3 normal (vote)
Target Milestone: ---   Edit
Assignee: Security vulnerabilitied reported against Eclipse projects CLA
QA Contact:
URL:
Whiteboard:
Keywords: security
Depends on:
Blocks:
 
Reported: 2021-03-23 08:03 EDT by Christopher Walker CLA
Modified: 2021-04-01 10:23 EDT (History)
1 user (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Walker CLA 2021-03-23 08:03:41 EDT
In Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.

CWEs
CWE-400

CVSS Score
7.5 High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

This will be resolved in Jetty 9.4.39, 10.0.2, 11.0.2 which we are currently working on releases for.

There is a workaround which requires usage of a custom class which we've detailed in the Security Advisory on GitHub.
Comment 1 Wayne Beaton CLA 2021-03-23 10:46:58 EDT
Use CVE-2021-28165

Let me know when you are ready for me to submit the CVE and commit the advisory.
Comment 2 Christopher Walker CLA 2021-03-30 09:02:43 EDT
Wayne,

Please feel free to publish the CVE and security advisory: https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
Comment 3 Wayne Beaton CLA 2021-04-01 10:17:58 EDT
I've pushed the CVE.

https://github.com/CVEProject/cvelist/pull/1233