There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4106-1 jetty9 security update
Debian DSA Debian DSA DSA-5894-1 jetty9 security update
EUVD EUVD EUVD-2024-3044 There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.
Github GHSA Github GHSA GHSA-g8m5-722r-8whq Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
Fixes

Solution

No solution given by the vendor.


Workaround

Do not use ThreadLimitHandler. Consider use of QoSHandler instead to artificially limit resource utilization.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00304}

epss

{'score': 0.0033}


Fri, 13 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhboac Hawtio
CPEs cpe:/a:redhat:rhboac_hawtio:4.0.0
Vendors & Products Redhat rhboac Hawtio

Thu, 14 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat amq Streams
CPEs cpe:/a:redhat:amq_streams:2
Vendors & Products Redhat
Redhat amq Streams

Fri, 08 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Eclipse
Eclipse jetty
Weaknesses CWE-770
CPEs cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
Vendors & Products Eclipse
Eclipse jetty

Tue, 15 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 01:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 14 Oct 2024 15:45:00 +0000

Type Values Removed Values Added
Description Impact Remote DOS attack can cause out of memory Description There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56 There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.

Mon, 14 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
Description Impact Remote DOS attack can cause out of memory Description There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56
Title Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2024-10-15T17:42:01.168Z

Reserved: 2024-08-26T15:58:44.006Z

Link: CVE-2024-8184

cve-icon Vulnrichment

Updated: 2024-10-15T17:41:57.293Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T16:15:04.380

Modified: 2024-11-08T21:00:09.857

Link: CVE-2024-8184

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-14T15:09:37Z

Links: CVE-2024-8184 - Bugzilla

cve-icon OpenCVE Enrichment

No data.