to launch remote DoS attacks by exhausting the server’s memory.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4106-1 | jetty9 security update |
![]() |
DSA-5894-1 | jetty9 security update |
![]() |
EUVD-2024-3125 | Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory. |
![]() |
GHSA-r7m4-f9h5-gr79 | Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks |
Solution
No solution given by the vendor.
Workaround
The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by: * not using the PushCacheFilter. Push has been deprecated by the various IETF specs and early hints responses should be used instead. * reducing the reducing the idle timeout on unauthenticated sessions will reduce the time such session stay in memory. * configuring a session cache to use session passivation https://jetty.org/docs/jetty/12/programming-guide/server/session.html , so that sessions are not stored in memory, but rather in a database or file system that may have significantly more capacity than memory.
Fri, 08 Nov 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Eclipse
Eclipse jetty |
|
Weaknesses | CWE-770 | |
CPEs | cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* | |
Vendors & Products |
Eclipse
Eclipse jetty |
Tue, 15 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Oct 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 14 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory. | |
Title | Jetty PushSessionCacheFilter can cause remote DoS attacks | |
Weaknesses | CWE-400 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-10-15T17:42:50.434Z
Reserved: 2024-07-15T17:35:50.791Z
Link: CVE-2024-6762

Updated: 2024-10-15T17:42:46.395Z

Status : Analyzed
Published: 2024-10-14T16:15:03.930
Modified: 2024-11-08T21:29:51.237
Link: CVE-2024-6762


No data.