CVE-2017-12174
moderate-risk
Published 2018-03-07
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
Do I need to act?
~
7.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (5)
References (24)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0268
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0269
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0270
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0271
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0275
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0478
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0479
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0480
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0481
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0268
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0269
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0270
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0271
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0275
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0478
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0479
Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:0480
and 4 more references
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
10/34 · Low
Exposure
12/34 · Low