CVE-2024-47535

Source
https://cve.org/CVERecord?id=CVE-2024-47535
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47535.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47535
Aliases
Downstream
Related
Published
2024-11-12T15:50:08.334Z
Modified
2026-05-16T03:55:32.012443883Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of Service attack on windows app using Netty
Details

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47535.json"
}
References

Affected packages