Description
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2017-1409.html
http://www.securityfocus.com/bid/98965
https://access.redhat.com/errata/RHSA-2017:1410
https://access.redhat.com/errata/RHSA-2017:1411
https://access.redhat.com/errata/RHSA-2017:1412
https://access.redhat.com/errata/RHSA-2017:3454
https://access.redhat.com/errata/RHSA-2017:3455
https://access.redhat.com/errata/RHSA-2017:3456
https://access.redhat.com/errata/RHSA-2017:3458
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2670
https://www.debian.org/security/2017/dsa-3906
Related Vulnerabilities
CVE-2021-22047 Vulnerability in maven package org.springframework.data:spring-data-rest-core
CVE-2011-2093 Vulnerability in maven package com.adobe.blazeds:flex-messaging-common
CVE-2022-34811 Vulnerability in maven package org.jenkins-ci.plugins:xpath-config-viewer
CVE-2021-22113 Vulnerability in maven package org.springframework.cloud:spring-cloud-netflix-zuul
CVE-2022-45390 Vulnerability in maven package io.loader:loaderio-jenkins-plugin