SB2024092527 - Multiple vulnerabilities in Red Hat Integration Camel Extensions for Quarkus 3.8.5



SB2024092527 - Multiple vulnerabilities in Red Hat Integration Camel Extensions for Quarkus 3.8.5

Published: September 25, 2024

Security Bulletin ID SB2024092527
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2024-3653)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect handling of requests within the LearningPushHandler. A remote attacker can send specially crafted requests to the web server and consume available memory, leading to a denial of service.

Successful exploitation of the vulnerability requires that the learning-push handler is enabled (disabled by default).


2) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2024-8391)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the gRPC server does not limit the maximum length of message payload. A remote attacker can send multiple extremely large messages to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.