CVE-2018-14642

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-14642
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14642.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-14642
Aliases
Related
Withdrawn
2025-05-22T18:51:40.212968Z
Published
2018-09-18T13:29:00Z
Modified
2025-01-09T04:49:54.830214Z
Downstream
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.

References

Affected packages

Debian:13 / undertow

Package

Name
undertow
Purl
pkg:deb/debian/undertow?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.23-1

Affected versions

1.*

1.3.4-1
1.3.5-1
1.3.7-1
1.3.11-1
1.3.16-1
1.3.19-1
1.3.21-1
1.3.23-1
1.4.0-1
1.4.1-1
1.4.3-1
1.4.4-1
1.4.6-1
1.4.7-1
1.4.8-1
1.4.18-1
1.4.20-1
1.4.21-1
1.4.21-2
1.4.22-1
1.4.23-1
1.4.23-2
1.4.23-3
1.4.25-1
1.4.25-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}