CVE-2018-14642
moderate-risk
Published 2018-09-18
An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.
Do I need to act?
-
0.71% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (18)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0362
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0364
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0365
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0380
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1106
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1107
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1108
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1140
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14642
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0362
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0364
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0365
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0380
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1106
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1107
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1108
Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:1140
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14642
33
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
2/34 · Minimal
Exposure
10/34 · Low