A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.

History

Thu, 04 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 03 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
Title Undertow: outofmemory when parsing form data encoding with application/x-www-form-urlencoded
First Time appeared Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
Weaknesses CWE-20
CPEs cpe:/a:redhat:amq_streams:1
cpe:/a:redhat:apache_camel_hawtio:4
cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:camel_quarkus:2
cpe:/a:redhat:camel_quarkus:3
cpe:/a:redhat:camel_spring_boot:3
cpe:/a:redhat:camel_spring_boot:4
cpe:/a:redhat:integration:1
cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:8
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:jboss_fuse_service_works:6
cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:optaplanner:::el6
cpe:/a:redhat:quarkus:3
cpe:/a:redhat:red_hat_single_sign_on:7
cpe:/a:redhat:serverless:1
cpe:/a:redhat:service_registry:2
Vendors & Products Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-12-03T20:55:19.911Z

Reserved: 2024-04-16T13:30:53.755Z

Link: CVE-2024-3884

cve-icon Vulnrichment

Updated: 2025-12-03T20:50:19.755Z

cve-icon NVD

Status : Received

Published: 2025-12-03T19:15:54.767

Modified: 2025-12-03T19:15:54.767

Link: CVE-2024-3884

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-12-03T16:50:50Z

Links: CVE-2024-3884 - Bugzilla

cve-icon OpenCVE Enrichment

No data.